Webinars Reports

Best practices for introducing tablets in your enterprise
sponsored by TechTarget Security
EGUIDE: There is a lot of hype around tablets, but many companies are still weighing their benefits. This expert e-guide explores the top reasons businesses should consider these devices and offers advice for keeping them secure once they have been implemented.
Posted: 20 May 2011 | Published: 20 May 2011

TechTarget Security

Build a Video Conference Room for your Needs
sponsored by Zoom Video Communications
EGUIDE: Setting up a video conference room in your office is about a little more than plugging in a camera and a screen. Download this expert guide for tips to design a video conference room, such as why you should say no to webcams.
Posted: 21 Jun 2018 | Published: 14 Jun 2018

Zoom Video Communications

E-guide: Integrating video conferencing with UC: What you need to consider
sponsored by TechTarget Security
EGUIDE: This SearchUnifiedCommunications.com e-guide discusses why video conferencing integration is a logical addition to your UC system and offers best practices for implementation.
Posted: 19 May 2011 | Published: 19 May 2011

TechTarget Security

Executive Visions on Video in the Workplace
sponsored by UStream
WHITE PAPER: Access the following white paper to uncover how leading executives are leveraging the effectiveness of live video for higher sales and customer engagement. Discover the technology to consider and why a live video initiative should be implemented as soon as possible.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

UStream

The 7 Biggest Mistakes You Can Make in Web Conferences
sponsored by Citrix Online Go To Meeting
WHITE PAPER: In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix Online Go To Meeting

Collaboration Services: Decision Criteria and 10 Questions to Ask Your Potential Collaboration Vendors
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com details the ten questions you should ask any potential collaboration vendor and offers a five-step process that will help you pick out the best products to create your collaboration architecture.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

TechTarget Security

A closer look at video conferencing solutions, technology and vendors
sponsored by TechTarget Security
EGUIDE: In order to successfully implement your video conferencing solutions, you must understand the physical components of your system.  This e-guide can help you by uncovering the ins and outs of video conferencing architectures while also providing an in-depth look at solutions, technology and vendors.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

Microsoft Lync: Product Guide
sponsored by Microsoft_Insight
WHITE PAPER: Access this white paper to explore Microsoft Lync 2013's latest features, including more intuitive and efficient tools to enable always-connected communications for your business needs in productivity and collaboration.
Posted: 11 Nov 2013 | Published: 30 Nov 2012

Microsoft_Insight

Collaboration Tools Shifting Work Culture in New Ways
sponsored by TechTarget Unified Communications
EBOOK: Collaboration is evolving at an unprecedented pace. What used to be an ad-hoc practice is now ubiquitous in our remote working world, and it is important to develop practical strategies to make the most of collaborative tools. Dive into this guide to learn how to do so, which includes 3 pillars of successful collaboration in the workplace.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

TechTarget Unified Communications

Communication and Collaboration in 2020: Inside UC’s Faster Future
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchUnifiedCommunications.com, we take a trip to the year 2020 in an attempt to uncover how unified communications and collaboration will evolve and what it will mean for your organization.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security