Instant Messaging (Communications) Reports

Jargon Buster Guide to Unified Communications
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
Posted: 08 Feb 2021 | Published: 26 Oct 2017

TechTarget ComputerWeekly.com

Maximizing ROI with the Microsoft-Polycom UC Solution
sponsored by Polycom, Inc.
WHITE PAPER: Read how Microsoft and Polycom’s partnership offers customers an end-to-end, fully interoperable unified communications (UC) solution that combines real-time instant messaging, voice, video, and data to lower business costs, improve productivity, and achieve a faster return on investments (ROI).
Posted: 15 Feb 2011 | Published: 15 Feb 2011

Polycom, Inc.

Nutra-Flo Drives Global Business with Robust Collaboration Platform
sponsored by IBM
CASE STUDY: Read this case study to see how Nutra-Flo Company adopted Lotus Notes and Domino 8 to collect collaborative applications in a single customizable interface and conveniently group communications, helping to improve staff productivity.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

IBM

Business Case for Integrated Unified Communications and Contact Center Solution
sponsored by ShoreTel - OLD
WHITE PAPER: In this whitepaper, discover how using unified communications (UC) in your contact center can help you increase effective communications between employees and clients, which will improve your customer satisfaction, retention, and loyalty rates.
Posted: 08 Jun 2012 | Published: 30 Jun 2010

ShoreTel - OLD

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Unified Communications & Collaboration Brochure
sponsored by Azzurri
BROCHURE: Learn more about Unified Communications and Collaborations (UCC), including a solution that delivers UCC as a managed service from a single source.
Posted: 03 Jan 2012 | Published: 03 Jan 2012

Azzurri

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition
sponsored by IBM
CASE STUDY: Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

IBM

Collaboration: Assessing the Business/Technology Issue
sponsored by TechTarget Security
EGUIDE: In the first of SearchUnifiedCommunications.com’s three-part guide on selecting collaboration products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of collaboration solutions.
Posted: 11 May 2012 | Published: 11 May 2012

TechTarget Security