Business of Information Technology  >   Business Processes  >  

Communications

RSS Feed    Add to Google    Add to My Yahoo!
Communications Reports
 
Gartner: CIO checklist for next-generation mobile strategies
sponsored by ComputerWeekly.com
ANALYST BRIEF: This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

How to start, refine and improve your social media business strategy
sponsored by ComputerWeekly.com
BOOK: This extract from Adam Gray's  book, Brilliant Social Media will help your organisation get started with social media, then refine and improve your strategy to get real business results.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Essentials to Transition Your Organization to Open Hybrid Cloud Architecture
sponsored by Red Hat
WHITE PAPER: This featured resource discusses on system that provides enterprise integration with lightweight structured service development. Access now for a look at what your company can do with these powerful tools, including easier and faster access to enterprise assets and increased business agility.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Red Hat

Maximizing Competitive Advantage — Through More Flexible Information Systems
sponsored by IS Tools
WHITE PAPER: Cloud computing and platform-as-a-service (PaaS) have now made it possible to create a fast and flexible IS that can adapt to your needs. This white paper reveals how the cloud has altered and enhanced the role of technology in business, and explains how enterprise IT buyers can optimize these processes by maximizing automation in the IS.
Posted: 04 May 2011 | Published: 04 May 2011

IS Tools

How Document Process Automation Helps SAP® Customers Improve Profitability
sponsored by Esker Inc.
WHITE PAPER: Written primarily for CEOs, CFOs, CIOs and managers, this paper is designed to help businesses effectively reduce the costs of document management and gain immediate additional value from their investments in SAP solutions.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

Esker Inc.

Business-Class Security and Compliance for On-Demand Instant Messaging
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM.
Posted: 16 Feb 2007 | Published: 01 Dec 2006

WebEx Communications, Inc.

Small Business Communications VoIP
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this paper to learn what is Small Business Communication VoIP and what it can do for your business.
Posted: 14 Aug 2009 | Published: 14 Aug 2009

Cisco Systems, Inc.

The Right Collaboration Architecture Drives Business Transformation
sponsored by Cisco Systems, Inc.
ANALYST REPORT: A recently completed study conducted for Cisco by Forrester Consulting reveals how companies are developing collaboration strategies that will enable innovation and improve productivity. View a brief video overview of the study. Then register to download the Forrester study and learn how four companies are transforming their businesses.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

Cisco Systems, Inc.

Unlocking business intelligence with collaboration
sponsored by IBM
WHITE PAPER: Accurate decision making is key to your company's survival. Read this paper to learn how collaborative business intelligence (BI) can help streamline the decision making process. Learn to optimize efficiency and business transparency by creating a collaborative BI framework that connects BI information and decisions to business outcomes.
Posted: 15 Aug 2012 | Published: 01 May 2012

IBM

Securing Business Communications Applications in Converged Networks - Best Practices
sponsored by Avaya Inc.
WHITE PAPER: Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic.
Posted: 10 Jun 2008 | Published: 01 Jul 2005

Avaya Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement