Online Meetings Reports

Video conferencing security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The video conferencing tool plays a vital role in keeping employees connected and productive, but it can also become an attack target of miscreants. Here are 11 tips to help enterprises adapt to a video conferencing-enabled workforce and host remote meetings in a secure and private manner.
Posted: 28 Sep 2022 | Published: 28 Sep 2022

TechTarget ComputerWeekly.com

The enterprise guide to video conferencing in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With all the broad technology shifts that have taken place during the pandemic, networked resources have become most vital. With the continued demand for conferencing services, the total addressable market size of communications and collaboration products and services will continue at a fair clip.
Posted: 14 Dec 2022 | Published: 14 Dec 2022

TechTarget ComputerWeekly.com

Empowering Drones to Support UK Safety Officials
sponsored by FourNet
WHITE PAPER: In this white paper, learn how 4net Technology is helping to address the shortcomings of drones with a Mobile Drone Kit that utilizes Avaya Equinox, a powerful gateway for calling messaging, conferencing and collaboration.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

FourNet

The Future of Business: Preparing to Meet its Challenges
sponsored by Cisco Systems, Inc.
WHITE PAPER: Cisco is addressing today's dominant trends and their implications for transforming IT architectures and critical business processes. This paper examines these trends, describes why the network is the logical starting point for transforming business, and offers insight into the most strategic IT investments that businesses should consider today.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

Cisco Systems, Inc.

Tips for Presenting to Business People
sponsored by Code42
WHITE PAPER: Presenting to "the Business" can be one of the most intimidating things that technical IT pros do as part of their standard job. This guide outlines strategies for giving a top-notch presentation.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

Code42

A closer look at video conferencing solutions, technology and vendors
sponsored by TechTarget Security
EGUIDE: In order to successfully implement your video conferencing solutions, you must understand the physical components of your system.  This e-guide can help you by uncovering the ins and outs of video conferencing architectures while also providing an in-depth look at solutions, technology and vendors.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

From Niche to Mainstream, the Evolution of Video Collaboration
sponsored by Avaya
WHITE PAPER: This report discusses how companies use video to create business value by reducing travel, achieving quantitative return on investment, and creating revenue.
Posted: 13 Jun 2011 | Published: 13 Jun 2011

Avaya

5 Benefits of Cloud-Based Video Collaboration
sponsored by LifeSize
WHITE PAPER: Explore the top five reasons to adopt cloud-based video collaboration in your organization, including connecting remote users and reducing infrastructure investments.
Posted: 18 Jul 2012 | Published: 31 Dec 2011

LifeSize

WebEx Video Conferencing Software Evolves with the Times
sponsored by Cisco Systems, Inc.
EGUIDE: If you're unaware of what WebEx video conferencing software has to offer, it's in your best interest to educate yourself on its exciting, evolving functionality. In this expert e-guide, learn how WebEx is evolving with the times to provide businesses with top quality video conferencing.
Posted: 10 Jan 2017 | Published: 09 Jan 2017

Cisco Systems, Inc.

Integrating Mobile Device Management with UC Systems and Features
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the issues with combining the unique communications services and interfaces of multiple mobile device operating systems with corporate unified communications (UC) strategies, and best practices to overcome these challenges.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

TechTarget Security