ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • Maximizing Marketing Impact: Great Content Combined with Great Distribution

    Sponsored by: Informa TechTarget

    In this webinar, led by TechTarget’s EVP/Publisher Rebecca Kitchens, examine opportunities to improve marketing performance from “content to click”, as well as key leverage areas you should be focusing on in your content and distribution.

  • Secret Ingredient For Revenue Growth (JS & DGR)

    Sponsored by: Informa TechTarget

    Tune into this TechTarget webinar to learn how revenue teams are applying intent data in highly strategic ways to support key go-to-market initiatives, and the strategies your team can adopt going forward.

  • 5 Key Differences between SASE and SD-WAN

    Sponsored by: Apcela

    SASE or SD-WAN? Before your business can determine which to use to support your distributed workforce, first, you need to understand the ways in which the technologies differ. Read on to consider 5 key differences between SASE and SD-WAN.

  • Five networking trends teams should focus on in 2023

    Sponsored by: Apcela

    As your distributed network grows, you have to keep in mind that your attack surface does too. So, how can you ensure that your network is protected from increasing and complex cyberattacks? Staying up to date on the latest networking trends can help. Explore this E-Guide to access 5 key networking trends for 2023.

  • Today's Market Realities Require New Demand Gen Strategies

    Sponsored by: Informa TechTarget

    Tune into this TechTarget webinar for 3 major pivot points for optimizing your demand capture capabilities moving forward – actions you should be considering to protect revenue in the short term and achieve breakthrough success in the future

  • 6 Core Principles for Establishing DevOps Security at Scale

    Sponsored by: CyberArk

    Disjointed DevOps security systems and practices can slow down CI/CD pipelines, frustrate developers, and lead to risky workarounds. You and other security leaders know that DevOps needs a new approach to security. This eBook details 6 guiding principles for enabling DevOps security at scale. Download the DevOps security eBook here.

  • Take Out the Trash (Replay)

    Sponsored by: Informa TechTarget

    Download this e-book to find out how inside sales teams can overcome the biggest issues in pipeline building with real-world examples and a step-by-step plan.

  • Successful ABM: What Developer Marketing Can Teach Us

    Sponsored by: Informa TechTarget

    Tune in to this TechTarget webinar for a deeper look into Developer Marketing, and discover how applying its core principles can help account-based marketers find, influence and convert all constituencies at their target accounts.

  • Planning the journey from SD-WAN to SASE

    Sponsored by: Apcela

    As businesses work to ensure secure connectivity for their distributed employees, many have moved from an SD-WAN framework to a SASE one. You may have some questions, like "How do SD-WAN and SASE compare?" and “What does a transition to SASE look like?” This E-Guide has answers. Keep reading to access networking insights.

  • Sustaining ABM Success: Balancing Scale and Customization

    Sponsored by: Informa TechTarget

    Tune into this webinar for a breakdown how to scale and personalize your ongoing webinar-based ABM efforts, from expanding the variety of your webinar formats to introducing virtual and hybrid events.

  • Unlocking Deep Engagement: Creating an Always-On Webinar Series

    Sponsored by: Informa TechTarget

    Tune in to this TechTarget webinar to learn how your organization can unlock deep engagement with an always-on webinar series, and discover the essential steps for launching your own low-cost engagement initiative.

  • Using High Value Offers for ABM Opportunity Creation

    Sponsored by: Informa TechTarget

    Tune in to this TechTarget webinar to learn how your organization can use high-value offers for ABM opportunity creation, providing timely business value that compels prospective buying teams to engage.

  • Who You Gonna Call? (Replay)

    Sponsored by: Informa TechTarget

    Tune into this webinar for the 3 critical hand-off points in the revenue lifecycle, and how you can capture and leverage customer intent data to make sure your customers are equipped with the knowledge they need.

  • The Great Decommission

    Sponsored by: ARG, Inc.

    Check out this data sheet to learn about 3 POTS/analog line replacement options as the Verizon Business 2022 deadline approaches.

  • What Human Behavior Can Teach Us About Effective B2B Marketing

    Sponsored by: BrightTALK by TechTarget

    Due to a variety of new technology and tools, marketing teams now have 360-degree view and insights into their audience. However, those insights mean nothing if you don’t know to utilize them to efficiently drive growth. So, how can you best decode audience behavior? Read through this guide to learn more.

  • Email Nurture Revival

    Sponsored by: BrightTALK by TechTarget

    With so many moving parts—from email cadence and personalization to lead qualification and content creation—nurture can get complicated quickly. We understand nurture can be overwhelming but downloading this e-book will help. It breaks down the basic nurture concepts so you can build a successful strategy.

  • Co-Presenting Webinars

    Sponsored by: BrightTALK by TechTarget

    In order to meet the demand for fresh marketing content, many have turned to leading webinars to help. But, if you continue to have the same people leading these sessions, you can risk content fatigue. Inviting another partner or customer to co-host might be your remedy. Access this guide to learn how to best co-present webinars.

  • Crafting Titles and Abstracts that Drive Webinar Registrations

    Sponsored by: BrightTALK by TechTarget

    As marketing teams look for a cost-effective way to reach a global audience while generating more revenue, many are turning to webinars to achieve their goals. But this all this content is redundant if you don’t have effective titles and abstracts to draw your consumers in. So, what are the best ways to do this? Browse this guide to learn more.

  • 3 Essential Requirements for Flawless Data Protection

    Sponsored by: Zscaler

    Now that data has left the data center and is everywhere, spread across a wide array of cloud applications, security is more complex than it used to be. This white paper aims to provide insights into generating greater data security by providing you with 3 essential requirements that could fuel greater data protection. Read on to learn more.

  • Demise of Dead-End Demand

    Sponsored by: BrightTALK by TechTarget

    While classic demand gen funnels and SDR follow-ups can help marketing teams benchmark performance, many have begun to struggle with certain breakpoints. These issues can lead to dead-end demand, and unfortunately, many organizations struggle to combat this with modern B2B buying. Access this guide to learn more.

  • A 3-Step Guide to Creating Authentic B2B Webinar Content

    Sponsored by: BrightTALK by TechTarget

    To enhance marketing and sales content, B2B companies have turned to webinars to open the floor to live engagement and reach new prospects to deliver revenue growth. However, many struggle to direct well-executed webinars and connect with their audiences. Access this guide to learn the best practices.

  • Designing Customer Conversations: Best Practices

    Sponsored by: Talkdesk

    To design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.

  • 6 Lessons for Cybersecurity Leaders

    Sponsored by: Splunk

    49% of organizations have suffered a data breach over the last 2 years, according to recent research by Splunk and the Enterprise Strategy Group. How can you boost your organization’s cybersecurity in the face of evolving threats? Explore 6 lessons for cybersecurity leaders, including to augment your cloud fluency.

  • 2022 Unit 42 Incident Response Report Webinar

    Sponsored by: Palo Alto Networks

    The cybersecurity landscape is constantly evolving, with more sophisticated cyberattacks occurring by the day. Tune in to this webcast to gain a better understanding of the current cybersecurity landscape and learn what you can do to improve your organization’s security operations.

  • Security Orchestration For Dummies

    Sponsored by: Palo Alto Networks

    Security refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book to start your security orchestration journey today.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.