Internet Telephony Reports

Case Study: Unified Communications and Indiana University Medical Group
sponsored by CDW Corporation
CASE STUDY: When outdated equipment and disparate systems were hampering in-house communications, customer service, and workflow, Indiana University Medical Group turned to CDW for a three-part Cisco solution. This case study gives details on the benefits they gained.
Posted: 08 Sep 2009 | Published: 01 Sep 2009

CDW Corporation

Voice over IP Networks: Ensuring Quality through Proactive Link Management
sponsored by Elfiq Networks
WHITE PAPER: Voice over IP (VoIP) networks offer clear advantages over traditional telephony technologies (PSTN) making it a choice that many organizations are making and migrating their systems to.
Posted: 08 Apr 2008 | Published: 01 Feb 2008

Elfiq Networks

Adding Cloud Telephony To Microsoft Teams
sponsored by Loopup
RESOURCE: Legacy, on-premise telephony hasn’t seen much use in the last year or so, and businesses are shifting to cloud telephony as a result. Because you don’t need to provision or maintain equipment, and it’s more secure, allowing for more flexible ways of working. Download this guide to learn how to add cloud telephony to Microsoft Teams.
Posted: 15 Mar 2021 | Published: 04 Mar 2021

Loopup

Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks
sponsored by Cisco Systems, Inc.
ANALYST REPORT: Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.
Posted: 10 Aug 2004 | Published: 24 May 2004

Cisco Systems, Inc.

IP Telephony for Mid-Sized Companies : Current trends and what’s in store for the future
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide highlights the top 5 trends in enterprise IP telephony and how you can improve collaboration and reduce costs. Uncover what you can expect for the future of IP telephony, what SIP trunking really means and how to take full advantage of its benefits
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

Unified communications etiquette guide: What to know, what to avoid
sponsored by TechTarget Security
EGUIDE: This e-guide takes a close look at UC etiquette: what you should know and what you need to avoid. Uncover the different types of strategies, applications, platforms and models you’ll need to help your organization streamline business processes with collaborative communications.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

TechTarget Security

Unified Communications Application: Uses and Benefits
sponsored by Cisco Systems, Inc.
PRODUCT LITERATURE: Productivity gains and cost savings from unified communication applications can be challenging for organizations considering the required investment. Based on a survey of 200 organizations using these applications, this paper outlines their challenges.
Posted: 27 Mar 2007 | Published: 01 Jan 2006

Cisco Systems, Inc.

Unified Communications Pocket Guide
sponsored by ShoreTel - OLD
EGUIDE: This guide is intended for both IT staff, voice system managers, as well as CIOs. It describes the issues decision makers need to understand as they set out to build a winning unified communication strategy.
Posted: 20 May 2009 | Published: 19 May 2009

ShoreTel - OLD

Oracle Improves Communications and Reduces Costs with SIP Trunking
sponsored by Oracle Corporation
WHITE PAPER: This case study showcases how, by migrating to an end-to-end IP architecture and implementing SIP trunks, Oracle has significantly consolidated and simplified its telephony infrastructure.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Oracle Corporation

Unified Communications Trends and Challenges: How to Stay on Top
sponsored by TechTarget Security
EGUIDE: This e-guide discusses the top trends affecting the unified communication's (UC) market as well as potential UC and IP telephony challenges. Learn what you can do to tackle these issues and stay ahead of the competition.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

TechTarget Security