October 2012 - (Free Research) From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.
May 2011 - (Free Research) This global benchmarking study from ESI international identifies the key challenges and successes experienced by project and programme management offices (PMO) and draws recommendations for the future.
August 2008 - (Free Research) Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.
June 2012 - (Free Research) In this month’s cover story, senior VP of research and CTO at IANS, David Shackleford, clarifies best practices for security pen testing as well as offers practical steps for building an internal testing program, how to measure success, what kinds of skills are needed, the tools to use, what the process should look like and more.
August 2008 - (Free Research) Messaging, internal and Web-based threats are increasing in number and severity. Read this Osterman Research white paper to learn how organizations must implement a layered defensive strategy to protect against all types of threats and how Sunbelt Software can help.
March 2008 - (Free Research) View this Webcast to explore the evolution of payroll and workforce data and their value to your enterprise. Discover how enterprises today are using payroll data to improve profits, grow business and become employers of choice.
December 2012 - (Free Research) Moving human resources applications into the cloud can be challenging. Read this white paper to uncover some solutions with cloud applications. It explores topics like talent management and compensation and how to ensure software-as-as-service (SaaS) offerings integrate into your business seamlessly.
February 2011 - (Free Research) Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
March 2006 - (Free Research) Throughout the CISSP preparation course offered by Global Knowledge, we cover the various security mechanisms, principles, concepts, and facts that will be included on the CISSP exam.
January 2012 - (Free Research) This report from Knowledge Peers and Pierre Audoin Consultants (PAC), reveals what leaders of Small and Medium-Sized Businesses (SMBs) think of IT – its strategic value, its potential, and the changing way in which it is being used in their organisations.
January 2010 - (Free Research) In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
April 2013 - (Free Research) In this week's Computer Weekly, with less than a year until Microsoft ends support for Windows XP, we examine the options for the many firms still using the operating system. The PC market has seen a record slump in sales - what does it mean for the IT industry? Plus, we evaluate progress in moving software to the cloud. Read the issue now.
February 2009 - (Free Research) This paper examines how many executives are beginning to understand that cutting cost by outsourcing call center operations isn't always the best solution. Learn how "cheaper" often comes at the expense of "better".
February 2009 - (Free Research) This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.
January 2013 - (Free Research) While the technologies available for big data are important, it's critical to make sure you have the right people with the right skills and experience to successfully leverage big data analytics tools. Inside, take a realistic look at what to plan for and examine the key skill sets and roles that should be a part of your big data analytics plan.
February 2011 - (Free Research) While many enterprises have moved to the private cloud model, have they adopted it entirely, and what are the roadblocks to getting there? In this inaugural edition of our Cloud Computing e-zine, we explore company strategies for private cloud adoption, some of the benefits of this model, and the challenges of a true private cloud infrastructure.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.