Webconferences Reports

Collaboration Tools Shifting Work Culture in New Ways
sponsored by TechTarget Unified Communications
EBOOK: Collaboration is evolving at an unprecedented pace. What used to be an ad-hoc practice is now ubiquitous in our remote working world, and it is important to develop practical strategies to make the most of collaborative tools. Dive into this guide to learn how to do so, which includes 3 pillars of successful collaboration in the workplace.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

TechTarget Unified Communications

A closer look at video conferencing solutions, technology and vendors
sponsored by TechTarget Security
EGUIDE: In order to successfully implement your video conferencing solutions, you must understand the physical components of your system.  This e-guide can help you by uncovering the ins and outs of video conferencing architectures while also providing an in-depth look at solutions, technology and vendors.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

The Power of In-Person Meetings
sponsored by Cisco
WHITE PAPER: View this comprehensive white paper that breaks down the top benefits of in-person meetings, and how businesses can still achieve the effects even with global colleagues, customers, or partners.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

Cisco

IBM Lotus Sametime Software Integration with Microsoft Applications: Connecting, Conversing and Collaborating More Conveniently
sponsored by IBM
WHITE PAPER: Check out this paper to learn about the many benefits of IBM Lotus Sametime software integration and how it can enhance the collaboration and unified communications capabilities of all your Microsoft Office applications.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

IBM

Best practices for introducing tablets in your enterprise
sponsored by TechTarget Security
EGUIDE: There is a lot of hype around tablets, but many companies are still weighing their benefits. This expert e-guide explores the top reasons businesses should consider these devices and offers advice for keeping them secure once they have been implemented.
Posted: 20 May 2011 | Published: 20 May 2011

TechTarget Security

Driving Collaboration Efficiency - H.264 High Profile
sponsored by Polycom, Inc.
WEBCAST: Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  View this webcast to learn how Less Delivers Much More!
Posted: 15 Sep 2010 | Premiered: Sep 15, 2010

Polycom, Inc.

Questions to ask when evaluating video conferencing service
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide highlights what you should know before implementing video conferencing, including what services you need, key requirements and a guide to evaluating video conferencing service providers.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

Cisco Systems, Inc.

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.

WebEx MeetMeNow
sponsored by WebEx Communications, Inc.
TRIAL SOFTWARE: Secure hosting of online meetings allows small to medium-sized businesses (SMBs) to cost-effectively collaborate with remote employees and partners. Try this free 14-day Web conferencing software trial to learn the benefits of secure online meetings.
Posted: 30 Jan 2007 | Premiered: 30 Jan 2007

WebEx Communications, Inc.

Enterprise Social Tools Need UC Integration to Thrive
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores why enterprise social networking tools need to be integrated with your everyday unified communications (UC) tools to be successful and unveils the benefits such an effort can provide.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

TechTarget Security