Web Events Reports

Collaboration Tools Shifting Work Culture in New Ways
sponsored by TechTarget Unified Communications
EBOOK: Collaboration is evolving at an unprecedented pace. What used to be an ad-hoc practice is now ubiquitous in our remote working world, and it is important to develop practical strategies to make the most of collaborative tools. Dive into this guide to learn how to do so, which includes 3 pillars of successful collaboration in the workplace.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

TechTarget Unified Communications

WebEx MeetMeNow
sponsored by WebEx Communications, Inc.
TRIAL SOFTWARE: Secure hosting of online meetings allows small to medium-sized businesses (SMBs) to cost-effectively collaborate with remote employees and partners. Try this free 14-day Web conferencing software trial to learn the benefits of secure online meetings.
Posted: 30 Jan 2007 | Premiered: 30 Jan 2007

WebEx Communications, Inc.

Build a Video Conference Room for your Needs
sponsored by Zoom Video Communications
EGUIDE: Setting up a video conference room in your office is about a little more than plugging in a camera and a screen. Download this expert guide for tips to design a video conference room, such as why you should say no to webcams.
Posted: 21 Jun 2018 | Published: 14 Jun 2018

Zoom Video Communications

Presentation Transcript: Driving Collaboration Efficiency - H.264 High Profile
sponsored by Polycom, Inc.
PRESENTATION TRANSCRIPT: Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  Read this transcript to learn how Less Delivers Much More!
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Polycom, Inc.

Best practices for introducing tablets in your enterprise
sponsored by TechTarget Security
EGUIDE: There is a lot of hype around tablets, but many companies are still weighing their benefits. This expert e-guide explores the top reasons businesses should consider these devices and offers advice for keeping them secure once they have been implemented.
Posted: 20 May 2011 | Published: 20 May 2011

TechTarget Security

The Power of In-Person Meetings
sponsored by Cisco
WHITE PAPER: View this comprehensive white paper that breaks down the top benefits of in-person meetings, and how businesses can still achieve the effects even with global colleagues, customers, or partners.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

Cisco

Enterprise Social Tools Need UC Integration to Thrive
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores why enterprise social networking tools need to be integrated with your everyday unified communications (UC) tools to be successful and unveils the benefits such an effort can provide.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

TechTarget Security

A closer look at video conferencing solutions, technology and vendors
sponsored by TechTarget Security
EGUIDE: In order to successfully implement your video conferencing solutions, you must understand the physical components of your system.  This e-guide can help you by uncovering the ins and outs of video conferencing architectures while also providing an in-depth look at solutions, technology and vendors.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

The Five Productivity Benefits of a Secure Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: A secure network foundation from Cisco enables you to easily and cost-effectively add new users and applications as needed.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Video conferencing adoption: Tracking trends and deployment strategies
sponsored by TechTarget Security
EGUIDE: Managers are looking for ways to incorporate video conferencing into their unified communications (UC) architectures as adoption continues to grow. This e-guide offers top recommendations and best practices to help you through the video decision process while ensuring quality stays a high priority.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security