Video Conferencing Services Reports

MicroScope – September 2020: Reach out to resellers
sponsored by MicroScope
EZINE: In this issue, discover how the channel is making sure the human touch is maintained during the pandemic, with insight into how closer bonds can be developed and on how to maintain productivity. Also read about 'hybrid working' is set to shape the future of the workplace
Posted: 08 Feb 2021 | Published: 04 Sep 2020

MicroScope

Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.
Posted: 08 Feb 2021 | Published: 09 Jun 2020

TechTarget ComputerWeekly.com

5 Benefits of Cloud-Based Video Collaboration
sponsored by LifeSize
WHITE PAPER: Explore the top five reasons to adopt cloud-based video collaboration in your organization, including connecting remote users and reducing infrastructure investments.
Posted: 18 Jul 2012 | Published: 31 Dec 2011

LifeSize

Videoconferencing Adoption by SMBs-- The Next Big Thing
sponsored by Polycom, Inc.
WHITE PAPER: As companies look for ways to survive during a tough economy, small and medium sized businesses are discovering the benefits of virtual collaboration through video conferencing. And now, advances in technology and price are accelerating this trend.
Posted: 25 Aug 2009 | Published: 24 Feb 2009

Polycom, Inc.

Video Conferencing: Best practices to meet user demand and improve collaboration
sponsored by TechTarget Security
EGUIDE: This e-guide discusses best practices to develop plans and policies for video conferencing, ensuring you not only meet user demands and improve collaboration, but also deliver measurable ROI.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

TechTarget Security

Virtualization of Video Infrastructure
sponsored by Vidyo, Inc.
WHITE PAPER: As virtualization spreads users across the globe, organizations are seeking solutions to keep their users connected. View this white paper to learn how the virtualization of video is helping make these options more affordable and flexible for businesses today.
Posted: 07 May 2013 | Published: 31 Jan 2013

Vidyo, Inc.

Video Overload: Preventing a network meltdown
sponsored by TechTarget Networking
EZINE: In this issue of "Network Evolution," early adopters of WebRTC video conferencing discuss its network requirements. Also, learn more about bare-metal switching and IPv6 routing.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

TechTarget Networking

Video conferencing adoption: Tracking trends and deployment strategies
sponsored by TechTarget Security
EGUIDE: Managers are looking for ways to incorporate video conferencing into their unified communications (UC) architectures as adoption continues to grow. This e-guide offers top recommendations and best practices to help you through the video decision process while ensuring quality stays a high priority.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

A Holistic View of SIP Trunking Solutions
sponsored by Siemens Enterprise Communications
PRESENTATION TRANSCRIPT: Get a holistic view of the potential costs and savings associated with SIP trunk consolidation.  Uncover actual costs and savings models, a review of key technical considerations, primary design considerations, and a discussion of a holistic architecture that can take you from SIP trunking to UC easily and economically.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Siemens Enterprise Communications

E-guide: Integrating video conferencing with UC: What you need to consider
sponsored by TechTarget Security
EGUIDE: This SearchUnifiedCommunications.com e-guide discusses why video conferencing integration is a logical addition to your UC system and offers best practices for implementation.
Posted: 19 May 2011 | Published: 19 May 2011

TechTarget Security