Event Catalog 2014
By: TechTarget View more from TechTarget >>
Download this next:
What will make the IT buying team come to your organization's event?
By: TechTarget
Type: Infographic
Face-to-face events in 2023 are facing a steep uphill battle. Average attendance faces a 36% decline in pre-pandemic attendance vs. post-pandemic registration, with an even steeper 50% decline for 'avid attendees' from previous years.
So, what's the solution? What will make the IT buying team come to your organization's event?
In this TechTarget infographic, take a deep dive into buyers’ attitudes towards attending in-person events, including their motivations why they would be inclined to attend, and the secrets to attracting them to your event.
These are also closely related to: "Event Catalog 2014"
-
From Disney to dishwashers: Digital CRM to change customer experience
By: TechTarget Customer Experience
Type: eGuide
In a technology-saturated world, customers have come to expect instant gratification from split-second texting, immediate answers from Google, and speedy online shopping from home. This effect also reigns true for marketers.
Access this expert e-guide to uncover how CRM has changed the entire customer experience and how this kind of technology can truly benefit your organization.
Also inside:
- CRM and Disney World
- Boosting customer data
- Customer perks of digital CRM
And more.
-
Computer Weekly – 2 October 2018: The most influential women in UK technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we announce our annual list of the 50 most influential women in UK technology, and talk to this year’s winner, Code First: Girls CEO Amali de Alwis, about the challenges of achieving diversity and inclusion in IT. Also, our latest buyer’s guide looks at the future of collaboration software and asks how to avoid information overload. Read the issue now.
Find more content like what you just read:
-
Ask the experts: Discover how to handle external security auditors
By: Dell Software
Type: eGuide
A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
-
Infosec 2012: How to Help Your Organisation Deal with Next-Generation Cyber-Attacks
By: TechTarget Security
Type: eGuide
This E-Guide offers expert insight on how to address next-generation cyber-attacks. View now to learn how network visibility can help you mitigate advanced threats, and much more!
-
Kicking Off HR Analytics: A How-To Guide
By: TechTarget Business Analytics
Type: eGuide
This e-guide provides five steps for kicking off HR analytics to meet goals and challenges. Read on to learn why meaningful metrics and narratives are essential when communicating HR analytics data.
-
Financial Management Systems Broken, But CFOs Still Not Sold On SAAS
By: TechTarget HR Software
Type: eGuide
This expert e-guide describes the value of software as a service (SaaS) financial management software, examines adoption trends, and offers advice regarding when and how to consider system replacement. Read on to learn more now.
-
Ensuring a seamless collaboration implementation
By: TechTarget Content Management
Type: eGuide
This expert e-guide uncovers common mistakes businesses often make when implementing a collaboration strategy that can derail business goals and tips for avoiding these mistakes and maximizing the likelihood of collaboration success.
-
Capitalizing on Big Data
By: TechTarget Business Analytics
Type: eGuide
This expert e-guide from SearchBusinessAnalytics.com explores the need for data-driven decision-making skills in the age of big data, and reveals Gartner's basic business rules for driving big data success. Read on to learn more.
-
MicroScope – June 2020: The surge in home working
By: MicroScope
Type: Ezine
The shift by many to home working has created opportunities and challenges for the channel as it looks to help customers through the changes. Also discover the importance of diversity in your workforce, and how Covid-19 is affecting IT events
-
Understanding Your PCI DSS Guidelines: Successes and Failures
By: TechTarget Security
Type: eGuide
This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.
-
New CRM Technologies bring sales success to businesses
By: TechTarget Customer Experience
Type: eGuide
In [this expert e-guide], read about how one emergency response software company integrated a CRM platform, resulting in major time-saving efficiencies – most importantly, an improved process that enables the company to sell product licensing. Also read about a lumber executive who recently bought into a successful social CRM.
-
What to expect in unified communications over the next decade
By: TechTarget Security
Type: eGuide
This expert E-Guide from SearchUnifiedCommunications.com takes a look at the coming decade and what you can expect from the world of communications and collaboration by the year 2020.
-
ITSM: Maintaining IT devices and applications
By: ServiceNow
Type: eGuide
This expert eGuide offers an inside look at IT service management, some of the benefits various support solutions offer and what you should look for in an ITSM tool. Also, engage in some opinions CIO's have on the subject of their ITSM pain points.
-
PCI compliance in the cloud: Can cloud service providers manage PCI?
By: TechTarget Security
Type: eGuide
Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
-
Recruitment Software Guide
By: TechTarget Business Analytics
Type: eGuide
Today's global, social world is changing the recruitment game, and HR teams must adapt their strategies and technologies to this reality if they hope to recruit the best candidates. In this expert e-guide, discover sourcing strategies to find high quality, "passive" candidates, how recruitment software is getting "socialized," and much more.
-
Choosing an MDM System: Fundamental Features for Success
By: TechTarget Security
Type: eGuide
There's a huge number of mobile device management (MDM) functions that exist today. Read this expert E-Guide to get a condensed list of the major MDM system features that most organizations require.
-
SOA Dos and Don’ts: Application Integration Tips For The CIO
By: TechTarget Business Analytics
Type: eGuide
Gartner reports that markets aligned to data integration and data quality tools are on an upward swing, set to push IT spending to $38 trillion by 2014. In this E-Guide, learn tips for application integration strategies.
-
Data governance 101: Creating a framework
By: Veritas
Type: eGuide
In this expert e-guide, we explore how to create an enterprise data governance framework. Uncover some strategic best practices for big data governance so that you can boost data quality and prevent critical inconsistencies.
-
Market trends: The Future of E-mail
By: TechTarget Security
Type: eGuide
Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
-
The connected enterprise: Leveraging cloud services for branch office integration
By: TechTarget Security
Type: eGuide
This SearchUnifiedCommunications.com E-Guide explores the benefits and challenges of unified communications (UC) virtualization and uncovers how to tackle virtual UC and VDI for your distributed enterprise.
-
The Truth About Mobile UC&C: Expert Roadmap
By: TechTarget Security
Type: eGuide
Despite the emphasis put on mobility in the world of unified communications and collaboration (UC&C), adoption of mobile UC&C clients is still very low. This expert e-guide discusses why, and what could make true solutions more meaningful.
-
Marketing automation platforms: 5 key features
By: Marketo
Type: eGuide
Read this comprehensive list of features you should look for before choosing a marketing automation platform. See this breakdown of five key automation areas, with specific clusters of features outlined.
-
Software-Defined Networking Could Make Network-as-a-Service a Reality
By: TechTarget Security
Type: eGuide
This E-Guide from SearchNetworking.com explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.
-
E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
By: TechTarget Security
Type: eGuide
This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
-
Getting sales reps to embrace analytics tools
By: Oracle Corporation
Type: eGuide
This e-guide, written by Scott Robinson (Director of BI at Lucina Health), explains why sales teams can be resistant to analytics tools, and how they can enhance the results of sales reps and managers.
-
Live-video support tools: Changing the game for remote support
By: LogMeIn Rescue Lens
Type: eGuide
With an explosion of IoT devices and continued growth of IT consumerization, market researchers see an opportunity for vendors with new-age remote support products. Uncover independent analysts' opinions of a live-video support tool and understand how it differentiates from competitors like Apple's FaceTime or Google Hangouts.
-
A Computer Weekly buyer's guide to the future of collaboration
By: TechTarget ComputerWeekly.com
Type: eGuide
Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients
-
FAQ: Building a DR site vs. outsourcing disaster recovery
By: TechTarget Storage
Type: eGuide
Access this E-Guide to learn more about the thought that should go into making this decision. Read on to discover more about the importance of a good DR plan and learn: pros and cons of custom-built DR sites vs. outsourced DR, differences between hot sites, cold sites and warm sites, considerationswhen developing your own site and more.
-
CRM Initiatives for Improved Customer Experience
By: TechTarget Customer Experience
Type: eGuide
Usually when deciding between CRM platforms businesses focused on the deployment method: cloud vs. on-premise. However, as bolstering the customer experience grows in importance, savvy companies are focusing their attention of the features the platform has to offer. Read on to learn which features should be considered in your buying decision.
-
Video collaboration: How to prepare your network
By: TechTarget Security
Type: eGuide
This e-guide reveals the extranet and desktop video requirements that are driving telepresence needs, and also identifies the emerging trends and best practices for videoconferencing available today. Also included, learn how the iPad is becoming a game-changer for some enterprises' video-conferencing strategies.
-
The Best of RSA: Mobile Security
By: TechTarget Security
Type: eGuide
To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.
-
How to measure and cut AWS costs
By: TechTarget Search AWS
Type: eGuide
This expert e-guide explores different cost management tools for Amazon Web Services (AWS) so that you can track, manage, and cut costs effectively.
-
4 ways to transform your business with mobility
By: Hewlett Packard Enterprise
Type: eGuide
To truly embrace mobility, rethink the way your organization does business, because with a well-planned mobility project, you can increase revenue and make employees more productive. This e-guide highlights four ways companies are using a mobility project to transform the way they do business.
-
The Need for Cloud Computing Security Standards
By: TechTarget Security
Type: eGuide
While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
-
How Key MDM Features Affect Mobile Security Policy Management
By: TechTarget Security
Type: eGuide
In this expert guide from SearchSecurity.com, find out how to tackle developing your organization's mobile policy around the latest MDM solutions. Discover which features impact security the most and how you can establish a strategy that compliments them.
-
Best Practices for Deploying SSD
By: TechTarget Storage
Type: EBRIEF
Check out this E-Brief for best practices and key considerations regarding SSD purchase and deployment. Learn the basics of solid state storage, determine if SSD is a good fit for your company and learn the keys to success before implementing.
-
SearchCRM.com E-Guide: Optimizing the customer experience with CRM
By: TechTarget Customer Experience
Type: eGuide
This expert e-guide provides insight on customer experience management, how to build it, and why companies are no longer focusing on cloud v. on-premise for CRM solutions.
-
Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
-
The Cloud and HR: Choosing the Right SaaS Application
By: TechTarget Business Analytics
Type: eGuide
This expert e-guide from SearchFinancialApplications.com outlines four questions to ask potential service providers before signing an HR SaaS contract. In addition, uncover the top five HR technology trends for 2013 that you should keep an eye out for.
-
The Cost and Benefits of BYOD
By: TechTarget Security
Type: eGuide
Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
-
Computer Weekly investigates Technology advancements in the Netherlands
By: TechTarget ComputerWeekly.com
Type: eGuide
With Google planning to build a datacentre in the Netherlands &ING launching a voice-recognition banking app, we look into the the advancements the technology sector in the Netherlands is making.
-
Expert tips for creating a mobile management strategy
By: TechTarget Security
Type: eGuide
Access this expert e-guide to learn more about creating a fluid mobile platform strategy to manage mobile diversity and then managing the diversity of mobile platforms.
-
Declutter your sales tools and applications
By: Oracle Corporation
Type: eGuide
New studies show that the abundance of sales tools that has negatively affected the output of sales departments. In this expert e-guide, learn why there can be too much of a good thing and why finding the right tool is just one part of making sure it fits with your sales strategy plan.
-
A Computer Weekly Buyer's Guide to Enterprise social networking
By: TechTarget ComputerWeekly.com
Type: eGuide
Companies are discovering the many advantages of communicating through social networking platforms. In this 14-page buyer's guide, Computer Weekly looks at how they can revolutionise collaboration, the options available for retailers and the pitfalls of communication overload
-
The Many Faces of Software Testing
By: TechTarget Security
Type: eGuide
Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected.
-
Computer Weekly – 10 October 2017: The most influential women in UK IT
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.
-
Mobile Device Management: Fundamental steps for success
By: TechTarget Security
Type: White Paper
This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.
-
Powerful DDoS attacks leveraging IoT
By: Arbor Networks
Type: eGuide
A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.
-
Data Center Modernization Starts With Cloud, SDN and Virtualization
By: TechTarget Security
Type: eGuide
This expert guide covers the essentials of modernizing your data center.