IT Services  >   Telecommunications Services  >   IP Services  >   IP Telephony  >  

Voice over Internet Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Voice over Internet ProtocolReports
 
Expert guide to mobile unified communications: Implementation best practices
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide uncovers the benefits of mobile UC, best practices for implementing fixed mobile convergence and mobile UC solutions as well as products that will make the execution easier.
Posted: 05 Jul 2011 | Published: 05 Jul 2011

SearchSecurity.com

Top 3 Drivers for Flexible UC Reference Architecture
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com offers insight into creating a unified communications architecture that fulfills today's requirements and is flexible enough to adapt to the needs of tomorrow.
Posted: 11 Sep 2012 | Published: 11 Sep 2012

SearchSecurity.com

Do I need a Firewall with my SBC?
sponsored by Sangoma Technologies
WHITE PAPER: This exclusive white paper takes an in-depth look at a UC security solution that was ablet to provide rock-solid VoIP security for all users. Read on to learn more.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Sangoma Technologies

Trends in Enterprise Mobility
sponsored by ComputerWeekly.com
WHITE PAPER: This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

IBM Tivoli Netcool network management solutions for VoIP
sponsored by IBM
WHITE PAPER: IBM Tivoli Netcool network management solutions enable better control of networks through automation, reliable information, and a critical view into the real-time state of the tens of thousands of devices that a multisite, multivendor provider of voice services can have.
Posted: 01 Oct 2011 | Published: 30 Sep 2011

IBM

Best Practices for Assuring VoIP Performance
sponsored by AppNeta
WHITE PAPER: Since no two networks are exactly the same, no two network assurance programs will be either. Fortunately, PathView Cloud adapts to your needs, and provides a complete approach.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

AppNeta

TechTarget ANZ’s guide to upgrading your PBX
sponsored by VExpress
EBOOK: Read this guide and discover how a new PBX could trim your telephony costs and boost productivity.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

VExpress

Find, Reach and Collaborate with IBM Unified Communications and Collaboration Solutions
sponsored by IBM
WHITE PAPER: Enterprises can improve productivity and cut costs with a unified communications (UC) infrastructure. Take your UC infrastructure to the next level.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

Guide to Session Border Controllers: The Good, The Bad, The Ugly
sponsored by Sangoma Technologies
EGUIDE: This e-guide from SearchUnifiedCommunications.com lays out the truth about session border controllers (SBC) – the good, the bad, and the ugly. View now to learn why you need SBC, potential obstacles, and how to overcome them.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Sangoma Technologies

Critical Communications for Business Continuity: How to Ensure Employees, Partners & Customers Stay Connected
sponsored by Polycom, Inc.
WHITE PAPER: This paper examines why companies should develop and implement an on-demand conferencing and collaboration plan that supports business continuity for both the enterprise and its customers.
Posted: 18 Oct 2011 | Published: 18 Oct 2011

Polycom, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement