Online Meetings Reports

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020

TechTarget ComputerWeekly.com

Prepare for the Future of Integrated Communications
sponsored by AT&T Corp
WHITE PAPER: Many communications infrastructures use multiple platforms for voice and date, which have a complete lack of cohesion. Unfortunately, these legacy infrastructures cannot deal with the demands communications initiatives today put on them.
Posted: 27 Mar 2012 | Published: 13 Dec 2011

AT&T Corp

Collaboration Services: Decision Criteria and 10 Questions to Ask Your Potential Collaboration Vendors
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com details the ten questions you should ask any potential collaboration vendor and offers a five-step process that will help you pick out the best products to create your collaboration architecture.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

TechTarget Security

Video Conferencing: Weigh the Benefits of Cloud vs. On-Premise
sponsored by TechTarget Unified Communications
EBOOK: In this expert handbook, we help you weigh the benefits of cloud vs. on-premise and explore how you can move from a hardware-centric video conference system to a more nimble, software-driven one.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

TechTarget Unified Communications

Securing your Video Conferences: How to Minimize Risks of Hacking
sponsored by Arkadin
WHITE PAPER: This informative guide provides valuable insight on the importance of secure collaboration across the web.
Posted: 11 May 2014 | Published: 09 May 2014

Arkadin

Top of the Class: City & Guilds Take a Radical Approach to Unified Communications
sponsored by Azzurri
WHITE PAPER: This case study highlights one leading UK organization that chose to install one managed service for its four existing telecom suppliers to enhance business productivity at a far lower cost.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Azzurri

Top 10 Things to Consider for Mobile Video Collaboration Success
sponsored by Avaya
WHITE PAPER: Success with mobile video collaboration hinges on careful planning. This brief resource counts down 10 considerations that will help ensure your mobile video strategy is well-thought-out, properly-sized, and future-ready.
Posted: 14 Aug 2013 | Published: 31 Dec 2012

Avaya

Assess a combined VoIP and unified communications framework
sponsored by TechTarget Unified Communications
EGUIDE: This this buyer's guide can help your organization develop its voice and unified communications strategy. Download the guide to examine what sets VoIP products apart -- including features, UC functionality, phone hardware compatibility and technical support -- and compare offerings from 10 industry-leading providers.
Posted: 05 May 2020 | Published: 05 May 2020

TechTarget Unified Communications

Questions to ask when evaluating video conferencing service
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide highlights what you should know before implementing video conferencing, including what services you need, key requirements and a guide to evaluating video conferencing service providers.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

Cisco Systems, Inc.

Wireless LANs and Multimedia: Matching wired network performance and quality
sponsored by TechTarget Security
EZINE: The June edition of SearchNetworking.com’s Network Evolution E-Zine outlines the three basic steps enterprises should follow when preparing for video. Uncover how to integrate these steps into your network plans and learn how to say goodbye to your troubles with video.
Posted: 01 Jun 2012 | Published: 30 May 2012

TechTarget Security