IT Management  >   IT Service Centers  >   Contact Centers  >  

IP-based Contact Centers

RSS Feed    Add to Google    Add to My Yahoo!
IP-based Contact Centers White Papers (View All Report Types)
 
Headsets in an IP Telephony Environment: Enabling Real-Time Collaboration
sponsored by Plantronics, Inc.
WHITE PAPER: A well-chosen headset can help to enhance the VoIP experience even when the network is not performing optimally. Read this white paper to learn the benefits of evaluating and selecting the right headset for your VoIP environment.
Posted: 01 May 2007 | Published: 01 Sep 2006

Plantronics, Inc.

Roadmap for Implementing a Multi-Site IP Contact Center
sponsored by Avaya Inc.
WHITE PAPER: Explore a three-part guide to identifying the potential presented by Internet Protocol (IP), building a business case for migration to IP and ultimately designing and implementing an IP infrastructure.
Posted: 20 May 2008 | Published: 01 Mar 2007

Avaya Inc.

ShoreTel Unified Communications Platform: Easy to Deploy, Use, and Manage
sponsored by ScanSource & ShoreTel
WHITE PAPER: Learn about a purpose-built for IP platform that can help you fully integrate rich communications capabilities across your organization to increase connectivity and boost productivity.
Posted: 07 Aug 2012 | Published: 31 Jul 2012

ScanSource & ShoreTel

SAP Business Communications Management Rapid-Deployment Solution
sponsored by SAP America, Inc.
WHITE PAPER: See how SAP has combined SAP Business Communications Management with implementation services to help you quickly and predictably improve customer service and reduce operational costs in inbound contact centers. The all-IP contact-center solution works with SAP CRM to further increase customer service benefits.
Posted: 24 Mar 2011 | Published: 24 Mar 2011

SAP America, Inc.

New ShoreTel IP Telephony Solution a Hole in One for Tiger Woods Foundation Headquarters and Learning Center
sponsored by ScanSource & ShoreTel
WHITE PAPER: Discover how one organization replaced their legacy PBX-based telephone system with an IP telephony system which helped increase flexibility, mobility, and productivity.
Posted: 08 Aug 2012 | Published: 31 Dec 2010

ScanSource & ShoreTel

Five Steps to Ensuring a Successful VoIP Migration
sponsored by inContact
WHITE PAPER: This paper presents five key steps that will ensure a successful migration from legacy voice technology to VoIP in a contact center or enterprise environment. Continue reading to learn more about these five steps and learn how they can help you.
Posted: 22 Sep 2010 | Published: 22 Sep 2010

inContact

Revolutionizing Patient Care Through Communications
sponsored by Avaya
WHITE PAPER: Learn how you can improve the efficiency and productivity of nurses providing patient care, as well as how they work with each other, physicians and other staff. This allows professionals to spend more time providing “hands-on” care to patients, and less time on coordination of that care.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Avaya

6 Steps to Building a Business Case for Enterprise Architecture
sponsored by Mega International
WHITE PAPER: You know that your company could improve, but how do you build the case that will get your executives to provide the necessary funding? This white paper covers the six steps you need to take in order to build the strongest possible case for using enterprise architecture to transform your business.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

Mega International

The Business Value of Modernizing Infrastructure with Hyper-Converged Systems
sponsored by Dell EMC and Intel®
WHITE PAPER: In this IDC paper, analysts explain how to use HCI to create more value, growth, and competitive advantage in distributed enterprises. Read on to leverage HCI to provide staff with high-performing business apps and services at non-central locations, reduce impactful outages and unplanned downtime, and more.
Posted: 09 Jan 2018 | Published: 31 Oct 2017

Dell EMC and Intel®

Unmask Evasive Threats
sponsored by McAfee, Inc.
WHITE PAPER: Gain insight into the steps taken and commands used during a malware attack from a destructive ransomware family.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement