Web Events Reports

Questions to ask when evaluating video conferencing service
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide highlights what you should know before implementing video conferencing, including what services you need, key requirements and a guide to evaluating video conferencing service providers.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

Cisco Systems, Inc.

IP Office eBook: Communications for your Growing Business
sponsored by Avaya
EBOOK: Organizations of all shapes and sizes are struggling to keep pace with the speed of today's anytime, anywhere business world. This eBook introduces an IP-based unified communications solution that will give you the tools you need to stay competitive.
Posted: 20 Jun 2013 | Published: 31 Mar 2013

Avaya

IBM Lotus Sametime Software Integration with Microsoft Applications: Connecting, Conversing and Collaborating More Conveniently
sponsored by IBM
WHITE PAPER: Check out this paper to learn about the many benefits of IBM Lotus Sametime software integration and how it can enhance the collaboration and unified communications capabilities of all your Microsoft Office applications.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

IBM

Video conferencing adoption: Tracking trends and deployment strategies
sponsored by TechTarget Security
EGUIDE: Managers are looking for ways to incorporate video conferencing into their unified communications (UC) architectures as adoption continues to grow. This e-guide offers top recommendations and best practices to help you through the video decision process while ensuring quality stays a high priority.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

The Evolution of Collaboration: Tying the Knot with UC
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchUnifiedCommunications.com, we explore the evolving relationship between unified communications (UC) and collaboration and explain why UCC is a match that can benefit any organization.
Posted: 17 Apr 2013 | Published: 17 Apr 2013

TechTarget Security

Collaboration Tools Shifting Work Culture in New Ways
sponsored by TechTarget Unified Communications
EBOOK: Collaboration is evolving at an unprecedented pace. What used to be an ad-hoc practice is now ubiquitous in our remote working world, and it is important to develop practical strategies to make the most of collaborative tools. Dive into this guide to learn how to do so, which includes 3 pillars of successful collaboration in the workplace.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

TechTarget Unified Communications

Locala Community Parthernships Use Web Conferencing in the Field
sponsored by DellEMC and IntelĀ®
WEBCAST: View this webcast to see how Locala Community Partnerships fared after implementing the cloud and laptop usage in efforts to improve patient care and create more efficient workflows.
Posted: 19 Mar 2014 | Premiered: Mar 1, 2014

DellEMC and IntelĀ®

Helping The Business Work Smarter, Not Harder
sponsored by Polycom, Inc.
WHITE PAPER: This informative guide explores three ways IT can bolster productivity with video-based collaboration.
Posted: 28 May 2014 | Published: 28 May 2014

Polycom, Inc.

Ease of Use in Web Conferencing – The Cost Benefits Of Making Usability a Priority
sponsored by IBM
WHITE PAPER: The benefits of Web conferencing have motivated many to become proficient at its use. But the economic downturn has brought a new urgency to finding ways to cut costs and work together efficiently. This study examines the role of usability as the major issue that stands in the way of truly beneficial adoption of web conferencing by the mainstream.
Posted: 18 Jun 2010 | Published: 18 Feb 2009

IBM

Best practices for introducing tablets in your enterprise
sponsored by TechTarget Security
EGUIDE: There is a lot of hype around tablets, but many companies are still weighing their benefits. This expert e-guide explores the top reasons businesses should consider these devices and offers advice for keeping them secure once they have been implemented.
Posted: 20 May 2011 | Published: 20 May 2011

TechTarget Security