Instant Messaging (Communications) Reports

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

e-Book: Chapter 6 - Ten Hidden E-Discovery Hazards
sponsored by Symantec Corporation
WHITE PAPER: This paper explains Ten hidden e-discovery hazards reviewing everything from databases and storage to instant messages and smartphones which can help ward off e-discovery surprises.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

Symantec Corporation

Collaboration: Assessing the Business/Technology Issue
sponsored by TechTarget Security
EGUIDE: In the first of SearchUnifiedCommunications.com’s three-part guide on selecting collaboration products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of collaboration solutions.
Posted: 11 May 2012 | Published: 11 May 2012

TechTarget Security

Story of Voice Transformation
sponsored by AT&T Corp
WHITE PAPER: This white paper discusses how voice capabilities have transformed in the past few years and explores why SIP and unified communications (UC) play such a big role in the way business is conducted today.
Posted: 16 Jun 2011 | Published: 16 Jun 2011

AT&T Corp

SCOPIA Connector for IBM Lotus Sametime
sponsored by RADVISION
PRODUCT LITERATURE: RADVISION's SCOPIA Conferencing Platform with SCOPIA Desktop brings advanced conferencing capability to IBM's next generation unified communications enhancing the instant messaging and conferencing capabilities of Lotus Sametime.
Posted: 09 Jun 2008 | Published: 28 Mar 2008

RADVISION

Integrating Mobile Device Management with UC Systems and Features
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the issues with combining the unique communications services and interfaces of multiple mobile device operating systems with corporate unified communications (UC) strategies, and best practices to overcome these challenges.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

TechTarget Security

Mastering New Challenges in Text Analytics: Making Unstructured Data Ready for Predictive Analytics
sponsored by SPSS Inc. Worldwide Headquarters
WHITE PAPER: This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by SPSS Inc.'s text analytics solutions.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

SPSS Inc. Worldwide Headquarters

Presentation Transcript: Extending and Securing Enterprise Communications with OCS R2 and Exchange Server 2007 SP1
sponsored by Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript features independent expert and Exchange MVP Richard Luckett giving an overview of OCS R2, its most compelling features, advanced configurations, and integration with Exchange 2007 Service Pack 1. Real life examples of how other companies have benefited from OCS R2 are also featured.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Microsoft

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Collaboration: RFP Technology Decisions Guide
sponsored by TechTarget Security
EGUIDE: Part two of SearchUnifiedCommunications.com's three-part guide on collaboration products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the process.
Posted: 11 May 2012 | Published: 11 May 2012

TechTarget Security