Employee Training White Papers

(View All Report Types)
Virtual Data Center eZine - Volume 4
sponsored by Virtual Data Center eZine - Volume 4
WHITE PAPER: This e-zine issue explains the direct benefits of implementing a SAP virtualization plan. It compares virtualization platforms, highlights common problems, and offers tips to leverage hardware-assisted memory virtualization.
Posted: 20 Aug 2008 | Published: 18 Aug 2008

All resources sponsored by Virtual Data Center eZine - Volume 4

Top 10 Skills in Demand in 2010
sponsored by Global Knowledge
WHITE PAPER: In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand.
Posted: 25 Jan 2010 | Published: 25 Jan 2010

Global Knowledge

Inclusion = everyone: Expert advice for improving tech diversity
sponsored by TechTarget ComputerWeekly.com
WHITE PAPER: At the Computer Weekly diversity in tech event, experts proposed a 15-point plan to improve diversity and inclusion across the industry. Suggestions focused on getting people into the sector and keeping them there. Download the full report here.
Posted: 02 Mar 2023 | Published: 03 Mar 2023

TechTarget ComputerWeekly.com

Four EHR Change Management Mistakes (And How to Avoid Them)
sponsored by HP & Intel®
WHITE PAPER: The question is no longer if your healthcare practice will make the transition to EHR, but when.  Careful planning and effective change management can help keep missteps – and the stress and costs that come with them – to a minimum.  This white paper presents strategies for avoiding common EHR implementation problems.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

How to measure successful internal talent mobility
sponsored by Oracle Corporation
WHITE PAPER: This resource reveals everything HR professionals, IT professionals, and business leaders need to know about internal talent mobility. With a strong internal mobility program, you can leverage your existing employee base to achieve corporate goals, shifting resources where they're best suited while keeping your employees engaged and content.
Posted: 03 Apr 2014 | Published: 31 Oct 2013

Oracle Corporation

Agile Transformation Strategy
sponsored by CollabNet
WHITE PAPER: The CollabNet Agile Coaches have observed patterns and key milestones in the way organizations adopt and scale Agile. "Agile Transformation Strategy," by Angela Druckman, CollabNet Certified Scrum Trainer and Agile Transformational Coach, outlines a sound strategy and transformational "blueprint" to help guide organizations on the path to Agility.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

CollabNet

Four Steps to a Best-Run Business
sponsored by SAP America, Inc.
WHITE PAPER: This document describes how you can build a strategy to unify and run your business more effectively.
Posted: 17 Sep 2008 | Published: 17 Sep 2008

SAP America, Inc.

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies