Voice over Internet Protocol Reports

Jargon Buster Guide to Unified Communications
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
Posted: 08 Feb 2021 | Published: 26 Oct 2017

TechTarget ComputerWeekly.com

Case Study: New capabilities of and applications for SIP Solutions
sponsored by XO Communications
CASE STUDY: This exclusive case study discusses how a multi-location auction company utilized an SIP solution that enabled them to capitalize on their investments in data and voice communications and maximize the performance of their IP.
Posted: 24 Jan 2014 | Published: 24 Jan 2014

XO Communications

Voice and Unified Communication-Enabled Networks: Three Critical Considerations
sponsored by Brocade
WHITE PAPER: The multi-service, mission-critical, business-enabling campus LAN needs consistent features and service reliability from edge to core. Talk to Brocade and find out how to deploy an extraordinary network for the entire enterprise-converged campus to consolidated data center.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Brocade

How to Unify Your Wireless Architecture Without Limiting Performance or Flexibility
sponsored by D-Link
WHITE PAPER: So much is happening today to give you a chance to rethink your wireless architecture. Learn what to look for in a wireless architecture that not only provides the mobility and performance today’s applications need, but also lowers your costs of operations while increasing wireless security.
Posted: 26 Apr 2010 | Published: 26 Apr 2010

D-Link

Tim Horton Children’s Foundation Implements ShoreTel for Reliable Unified Communications
sponsored by ScanSource & ShoreTel
CASE STUDY: Discover how one organization improved reliability, increased employee productivity, and lowered TCO by implementing a new unified communications and VoIP solution to increase communications.
Posted: 08 Aug 2012 | Published: 31 Dec 2010

ScanSource & ShoreTel

E-Book: The Executive’s Guide to Contact Center Technology Planning
sponsored by inContact
EBOOK: In this e-book learn about emerging contact center technology trends and newer options like self-service technology, analytics and Web 2.0. Find out about 10 must-have technologies for the contemporary contact center. Learn how to select the best technology to meet your needs, and read expert advice for setting up contact center technology.
Posted: 12 May 2010 | Published: 12 May 2010

inContact

Guide to Session Border Controllers: The Good, The Bad, The Ugly
sponsored by Sangoma Technologies
EGUIDE: This e-guide from SearchUnifiedCommunications.com lays out the truth about session border controllers (SBC) – the good, the bad, and the ugly. View now to learn why you need SBC, potential obstacles, and how to overcome them.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Sangoma Technologies

ManageEngine OpManager 8.5
sponsored by ManageEngine
TRIAL SOFTWARE: OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc.
Posted: 27 Jul 2010 | Premiered: 27 Jul 2010

ManageEngine

Workplace Collaboration Partners Pursue Skype for Business
sponsored by Carousel Industries
EGUIDE: This e-guide discusses how Skype for Business has changed the way that enterprises collaborate, and examines how collaboration has evolved beyond the conference room and into workers' pockets.
Posted: 18 Feb 2016 | Published: 15 Feb 2016

Carousel Industries

Expert guide to mobile unified communications: Implementation best practices
sponsored by TechTarget Security
EGUIDE: This expert e-guide uncovers the benefits of mobile UC, best practices for implementing fixed mobile convergence and mobile UC solutions as well as products that will make the execution easier.
Posted: 05 Jul 2011 | Published: 05 Jul 2011

TechTarget Security