Unified Comms

The unified communications industry aids businesses through video conferencing and various messaging technologies.

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Sponsored By Cisco Systems

  • White Papers // Jan 2015

    Migrating Linux applications from x86 to IBM Power Systems: A discussion of best practices

    PowerVM is a complete virtualization solution that is integrated and packaged with Power Systems. This is a very robust implementation of virtualization developed by IBM, based on best practices learned over the course of four decades of experience with the IBM mainframe. Read More..

    Sponsored By IBM

  • White Papers // Jul 2014

    2014 Survey Report - Remote Collaboration Challenges & Strategies to Overcome

    Polycom surveyed 5,000 business professionals from all job levels around the world that focused on collaboration challenges to support a mobile and flexible working environment. Download this survey to learn what these Senior IT professionals say are their biggest remote collaboration challenges and discover the strategies they deploy to...

    Sponsored By Polycom

  • White Papers // Jan 2015

    Is your platform secure? Really?

    The introduction of the cloud architecture, with its virtualizati on basis, has created new avenues of attack. The challenge of protecting the organizational assets and process, while avoiding adverse impact on service levels, is growing. Although many organizations view security as a simplistic access to assets, the Solitaire Interglobal Ltd....

    Sponsored By IBM

  • White Papers // Nov 2014

    Basic Components and Considerations for Deploying Video Conferencing Solutions

    Video Conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses are looking to providers of telephony, business applications and network infrastructure services to include this capability...

    Sponsored By Polycom

  • White Papers // Mar 2015

    IBM Software: IBM Security Identity Governance & Administration

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance. Read More..

    Sponsored By IBM

  • White Papers // Nov 2014

    EMA Report: IBM Security QRadar Incident Forensics vs. Other Industry Tools

    In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92. Read More..

    Sponsored By IBM

  • White Papers // Mar 2015

    Collaboration Unchained: Tapping the Potential of Unified Communications

    Emails, phone calls, and in-person meetings remain fundamental to how many large organizations communicate—internally and externally. However, the emergence of collaborative technologies is enabling customers, competitors and employees to innovate, disrupt and challenge the ways in which work gets done and value is created. This report produced with WSJ. Custom...

    Sponsored By NTT Communications

  • White Papers // Mar 2015

    EMA Report Data Capture and Network Forensics, State-of-the-Market: IBM Security QRadar Incident Forensics vs. Other Industry Tools

    In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92. Read More..

    Sponsored By IBM

  • White Papers // Nov 2014

    IDC: Storage User Demand Study on Adoption of Public Cloud and Other Third-Party Storage Services

    This report focuses on analysing current and future deployments of enterprise storage systems for particular data uses ranging from major enterprise applications to various segments of the IT infrastructure support to storage infrastructures within public cloud datacentres. Download this report and learn more insights on adoption of third-party storage services.

    Sponsored By NetApp

  • Videos // Nov 2014

    Video - HP LiveVault

    This video is a demonstration of how LiveVault, a cloud-based server data protection solution from HP Autonomy, can be used to protect critical file data stored on a HP StoreEasy Storage appliance.

    Sponsored By HP

  • White Papers // Feb 2015

    Six Steps to Creating a Highly Collaborative Video Culture

    Polycom and Quocirca surveyed over 800 business video conferencing users around the world on the state of video adoption. The global findings have identified the top six key things to consider when creating a highly collaborative video culture. And it is not just about reducing travel!Download this infographic to discover...

    Sponsored By Polycom, Inc.

  • White Papers // Feb 2015

    Revolutionizing the Future Workplace

    A variety of technological, demographic and cultural forces are converging at this unique moment in history and stand poised to revolutionize the workplace of the future. Customers are demanding the ability to access the marketplace from anywhere, anytime and on any device; newer employees now expect the flexibility to collaborate...

    Sponsored By Polycom, Inc.

  • White Papers // Nov 2014

    2014 Gartner Report: Critical Capabilities for Security Information and Event Management

    "IBM Security QRadar received an ""Excellent"" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Read More..

    Sponsored By IBM

  • eBooks // Feb 2015

    Failure: Analyze It, Don't Humanize It.

    Beat the Law of Market Failure-an expert's POV. Alberto Savoia, formerly of Google and originator of the brilliant theory of "pretotyping," has created a product builder's philosophy that encourages a healthy, objective, and best of all, productive analysis of failure that takes the pain out of failure and improves ideas,...

    Sponsored By Jama Software

  • White Papers // Aug 2014

    Unified Communications Buyers Guide: The Top Ten Requirements for a UC Solution

    This document offers an overview of the current top ten requirements to consider for a premise-based UC solution, with features called out as well as a ShoreTel case study.

    Sponsored By ShoreTel

  • Case Studies // Jul 2014

    A Forrester Total Economic Impact Case Study

    Forrester Research conducted a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. Download this case study to understand the framework for evaluating the potential financial impact of Polycom voice solutions within their organizations....

    Sponsored By Polycom

  • White Papers // Mar 2015

    Best Practices Approach for Migrating to Richer Collaboration

    Businesses are exploring new delivery models to support this increased collaboration. They are considering a variety of models, such as on premises, cloud (public/private), and/or hybrid, to gain flexibility, simplified management, and more consistent services. They are also considering a variety of infrastructure options like dedicated, hosted, and/or virtualized. Cisco®...

    Sponsored By Cisco Systems

  • White Papers // Mar 2015

    Forbes Insights - Boost Innovation With Video Communications

    Video communications and videoconferencing have been a part of corporate life for decades. It already is a staple of executive conference rooms, and many larger organizations maintain in-house or contracted video capabilities for special events and presentations. Now, thanks to easy-to-use technology and affordable options, a wide range of employees...

    Sponsored By Cisco Systems

  • Downloads // Mar 2015

    Achieve More with Video Collaboration - Cisco CMR

    As the workforce becomes more mobile and distributed, leaders recognize the benefits and growing impact of video as a key part of business collaboration. Video is becoming more pervasive. Cisco Collaboration Meeting Rooms (CMR) brings together our industry-leading video conferencing infrastructure and proven, scalable, WebEx cloud...

    Sponsored By Cisco Systems

  • White Papers // Feb 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Sponsored By IBM

  • White Papers // Feb 2015

    Get On Your Way to a Secure Mobile Enterprise

    This infographic shows the key points on the path to a secure mobile enterprise, and how holistic protection from IBM can help organizations move beyond device security and extend protection to sensitive content, applications and transactions.

    Sponsored By IBM

  • White Papers // Nov 2014

    Migrating Linux applications from x86 to IBM Power Systems

    PowerVM is a complete virtualization solution that is integrated and packaged with Power Systems. This is a very robust implementation of virtualization developed by IBM, based on best practices learned over the course of four decades of experience with the IBM mainframe. Read More..

    Sponsored By IBM

  • White Papers // Nov 2014

    Solitaire Interglobal: Is your platform secure? Really?

    The introduction of the cloud architecture, with its virtualization basis, has created new avenues of attack. The challenge of protecting the organizational assets and process, while avoiding adverse impact on service levels, is growing. Although many organizations view security as a simplistic access to assets, the Solitaire Interglobal Ltd. (SIL)...

    Sponsored By IBM

  • White Papers // Feb 2015

    Behavior-based Protection Strategies from the Network to Remote Endpoints.

    This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.

    Sponsored By IBM

  • White Papers // Feb 2015

    The Total Economic Impact of IBM Information Integration and Governance Solutions: Cost Savings and Business Benefits Enabled by IBM

    IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by leveraging IBM InfoSphere Information Integration and Governance (IIG) solutions. To assess the total financial benefit associated with increasing data governance maturity through IIG implementation, Forrester interviewed...

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security Products Provide Intelligence, Integration, Expertise for Federal Environments

    In the era of big data, complex infrastructures and sophisticated security threats, IBM delivers products and services based on three main tenets - intelligence, integration, expertise - to help federal departments and agencies achieve secure environments using security intelligence.

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security Services Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents.

    Sponsored By IBM

  • White Papers // Mar 2015

    IBM Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents. Read More..

    Sponsored By IBM

  • White Papers // Jan 2014

    The Role of the Network in Cloud Computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • Research // Dec 2014

    Conferencing Loud & Clear

    We spend hours in phone conferences with colleagues, clients, and customers every day, but poor sound quality can turn a productive collaboration into a time-wasting drag. Next-generation conference phones deliver whole-room coverage and crystal-clear audio that keeps participants engaged. Have you ever dialed into a conference call, only to...

    Provided By VTech

  • White Papers // Jun 2014

    Whitepaper: Datacom’s Multi-cloud Services

    Each cloud has its pros and cons: private can be too expensive, public often doesn’t fit organisations’ application requirements and hybrid can be too complicated. And each cloud services provider brings different challenges to the table, such as the inability to scale on demand, uncontrollable costs and unreliable security.Find out...

    Provided By EMC

  • White Papers // Nov 2014

    Basic Components and Considerations for Deploying Video Conferencing Solution

    Video Conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses are looking to providers of telephony, business applications and network infrastructure services to include this capability...

    Provided By Polycom

  • White Papers // Jun 2014

    Improve your Unified Communications ROI

    IT decision makers concentrate hard on vintegrating real-time tools like instant messaging and voice and video conferencing with voicemail, email and text messages, they neglect the emotional and informational needs of the end user. The result? Your company has made a significant investment on a flawless UC platform and cutting...

    Provided By Plantronics

  • White Papers // Jul 2014

    Survey Report - Remote Collaboration Challenges & Strategies to Overcome

    In late 2013, Polycom surveyed 5,000 business professionals from all job levels around the world that focused on collaboration challenges to support a mobile and flexible working environment. Download this survey to learn what these Senior IT professionals say are their biggest remote collaboration challenges and discover the strategies...

    Provided By Polycom, Inc.

  • White Papers // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Provided By IBM

  • White Papers // Dec 2009

    LocaPhone VoIP PBX System

    LocaPhone as a software based VoIP system delivers a number of unparalleled advantages. Substantial cost reduction - Combined with IP telephones and media gateway telephony hardware offered by different manufacturers, LocaPhone provides a PBX at a fraction of the price of traditional PBX and key systems, while providing a level...

    Provided By LocaNet oHG

  • White Papers // Oct 2010

    Hardware Implementation of the PCM Codec for VOIP Telephony

    This paper presents the hardware implementation of the Pulse Code Modulation coder and decoder (PCM Codec), that aims at improving the delay of the speech compression of this codec, which is originally implemented in software for Voice-over Internet Protocol (VoIP) Telephony. This design provides a solution known as Intellectual Property...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2014

    Finding agility in the age of applications

    Bringing it all together: the complete application lifecycle. This white paper illustrates how Agile helps application teams deliver higher-quality software faster. Learn how Agile encourages collaboration between application and business teams. Assisting by providing software development and deployment solutions that are more closely aligned with business requirements and help to...

    Provided By Planit

  • White Papers // Feb 2008

    Compare IP PBX systems from leading vendors like Cisco, Nortel and Avaya

    This Comparison Guide features the leading PBX systems from established vendors like Siemens, Cisco, Avaya and Nortel as well as cutting edge systems from new vendors like Shoretel and Fonality. The Enterprise IP PBX market is rapidly changing to keep pace with the rapid technological and business process changes...

    Provided By VoIP-News