Voice-over-Broadband Reports

Improving VoIP Quality and the Impact of Skype for Business Telephony
sponsored by Comcast Business
EGUIDE: In this expert e-guide, learn how to properly architect your VoIP so you can provide users with better quality of voice and support for a number of concurrent voice connections. Additionally, discover how Skype for Business telephony stacks up for enterprises.
Posted: 09 Mar 2017 | Published: 07 Mar 2017

Comcast Business

Routers are Dead; Long Live the Router
sponsored by Cisco Systems, Inc.
WEBCAST: Get a firsthand look at the next-gen routers that will enable you to create a truly borderless network, while giving you the convenient, powerful network management features you crave in today’s resource-challenged IT environment.
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

The Quest for Killer SIP Apps
sponsored by NACR
WEBCAST: Learn the benefits SIP can bring to your organization – helping you provide a heterogeneous UC environment to your users, increase enterprise mobility, ensure the delivery of communications applications, and more!
Posted: 13 Jun 2012 | Premiered: May 31, 2012

NACR

Cisco Small Business 300 Series Managed Switches: Performance, Power Consumption and Features vs. D-Link, HP Networking and NETGEAR
sponsored by Cisco Systems, Inc.
TEST RESULTS: Cisco Systems commissioned Tolly to evaluate several models of the new Cisco Small Business 300 Series of managed switches along with comparable models from D-Link, HP Networking and NETGEAR. Read this test report to see how the Cisco 300 Series Managed Switches compares in the performance, power consumption and features against competitors.
Posted: 06 Apr 2011 | Published: 01 Feb 2011

Cisco Systems, Inc.

Shifting Unified Communications into the Cloud and Mobile Apps
sponsored by TechTarget Unified Communications
EBOOK: This Technical Guide explores the disconnect between UC applications and how employees in sales, marketing, customer service and other departments do their job. It also discusses how vendors are working to integrate UC capabilities in popular work software, like customer-management applications, on both desktop and mobile devices.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

TechTarget Unified Communications

Voice and Unified Communication-Enabled Networks: Three Critical Considerations
sponsored by Brocade
WHITE PAPER: The multi-service, mission-critical, business-enabling campus LAN needs consistent features and service reliability from edge to core. Talk to Brocade and find out how to deploy an extraordinary network for the entire enterprise-converged campus to consolidated data center.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Brocade

Plantronics UC Toolkit Planning FAQ
sponsored by Plantronics
WHITE PAPER: The Plantronics UC Toolkit, Planning FAQ addresses the most common questions IT organizations raise when planning UC audio device deployments.  
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Plantronics

Unified communications etiquette guide: What to know, what to avoid
sponsored by TechTarget Security
EGUIDE: This e-guide takes a close look at UC etiquette: what you should know and what you need to avoid. Uncover the different types of strategies, applications, platforms and models you’ll need to help your organization streamline business processes with collaborative communications.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

TechTarget Security

Upgrading Wireless Networks in the Hospital
sponsored by TechTarget Health IT
EBOOK: In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

TechTarget Health IT

SIP contact centers: Key benefits and potential challenges
sponsored by TechTarget Security
EGUIDE: Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

TechTarget Security