E-mail Monitoring Reports

Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.
Posted: 27 May 2021 | Published: 01 Jun 2021

TechTarget ComputerWeekly.com

2021 UKI Salary Survey Results
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021 and the current diversity landscape residing in the UK tech sector.
Posted: 15 Mar 2021 | Published: 22 Feb 2021

TechTarget ComputerWeekly.com

Ten Key Steps to Effective Succession Planning
sponsored by Halogen Software
WHITE PAPER: Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.
Posted: 21 Aug 2008 | Published: 20 Aug 2008

Halogen Software

Uncovering assessment response bias
sponsored by IBM
WHITE PAPER: The following white paper details the importance of being able to evaluate nearly every aspect of a potential candidate and most importantly, how to do so.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

IBM

Web Monitoring for Employee Productivity Enhancement
sponsored by GFI Software
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009

GFI Software

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

TOTSA Unearths Greater IT Efficiency with DYS CONTROL!™
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
CASE STUDY: Messaging management, when deployed effectively, has the power to provide IT with knowledge regarding how many messages have been delivered, system measurements and cost allocation. Learn about an email management system that provides these...
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

It's 2008: Do You Know Where Your Talent Is? - Connecting People to What Matters
sponsored by SAP America, Inc.
WHITE PAPER: Demand for knowledge workers is rising even as their skills and abilities are falling into short supply. This research report about acquisition and retention strategies questions the "war for talent" approach to these emerging trends.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

SAP America, Inc.

Eliminate Performance Anxiety Manage Employee Performance Better
sponsored by Epicor Software Corporation
WHITE PAPER: How do you manage the performance of your workforce today? Access this guide to learn how to implement effective goal setting around 5 key traits, construct an efficient feedback loop, and harness the right tools to manage performance across your entire organization.
Posted: 30 Jun 2014 | Published: 31 Oct 2012

Epicor Software Corporation

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security