Collaboration
Get the tips and best practices for implementing, adapting, and changing the collaboration framework in your company.
-
10 Reasons Why Documents and Spreadsheets Are Killing Your Career
Using documents and spreadsheets for requirements definition and management can be pretty painful at times, but have you considered that these tools might actually be killing your career?Take a look a...
Sponsored By Blueprint Software
-
Ditch Your Manual IP Address Tracking Spreadsheets
IP address management via spreadsheets has many weaknesses and is quickly becoming outmoded. The fact is static spreadsheets are just no match for today’s dynamic networks. One great alternative to ...
Sponsored By SolarWinds
-
Learn How To Be an IP Address Management Ninja
Break free of spreadsheets once and for all and start managing your network like an IPAM ninja master! Learn about automation, consolidation, and control so you can become an IP address management nin...
Sponsored By SolarWinds
-
Say Goodbye to Spreadsheets & Hello to Simplified IP Address Management
With SolarWinds® IP Address Manager (IPAM), you can finally ditch those outmoded spreadsheets and the problems that come along with them for the reliability and scalability of an automated and consoli...
Sponsored By SolarWinds
-
Test Drive the Interactive Online Demo – No Registration Required!
Static spreadsheets and home-grown IP address management tools just don't cut it in today’s increasingly dynamic networks. Experience a better solution when you visit SolarWinds IP Address Manager on...
Sponsored By SolarWinds
-
CRUSH IP CONFLICTS! Download a FREE IP Address Management Tool!
Stop wasting precious time with error-prone, home-grown IP address tools and spreadsheets that lead to costly IP address conflicts. Quickly and easily figure out which addresses are available and whi...
Sponsored By SolarWinds
-
Enabling Collaboration with BlackBerry Work Drives, Cisco WebEx and Microsoft SharePoint
Employees today need to connect quickly with people, content and resources to get work done. Often, that requires collaboration across departments, geographies, and other enterprises. Learn how BlackB...
Sponsored By BlackBerry
-
Enable UC with BlackBerry Mobile Voice System & BlackBerry Enterprise Instant Messaging
Unified Communications connect individuals, real-time information and teams, enabling effective collaboration when and where it needs to happen. In this webcast, find out exactly how BlackBerry® Mobil...
Sponsored By BlackBerry
-
Top 10 Steps to Ensure a Successful Migration to Exchange 2013
Are you ready to make the move to Exchange 2013? Good idea - it delivers improved administration, better security, reduced operating costs and much more. However, without proper planning, it could pot...
Sponsored By Dell Software
-
SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis
While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capa...
Sponsored By IBM
-
Transforming spreadsheets: planning, budgeting and forecasting for midsize companies
A spreadsheet-based approach to performance management won't meet the challenges facing growing midsize businesses. You need confidence in the information you're using for critical decision-making. Re...
Sponsored By IBM
-
Cisco Service Provider Next Generation Networks
What is Cisco Service Provider Next Generation Networks (IP NGN) and why do we care? This white paper will answer those questions and look at some of the technologies that are used within those networ...
Sponsored By Global Knowledge
-
Become a social business in the cloud IBM SmartCloud for Social Business collaboration services
Help create business value by becoming a social business in the cloud. IBM SmartCloud for Social Business social collaboration services provide integrated email, social business capabilities and third...
Sponsored By IBM
-
Optimizing Microsoft Exchange for the Enterprise: Hub Transport Server and Lync-SharePoint Integration
In this white paper, we will look at Optimizing the Hub Transport Server, Miscellaneous Features, and Lync-SharePoint Integration of Microsoft Exchange for the Enterprise. First we examine configurati...
Sponsored By Global Knowledge
-
IPO 8.1 Brings Significant Changes to the IP Office Communication Solution
IP Office Server Edition R8.1 brings significant changes to the IP Office product offering. It opens up access to mid-market opportunities with the IP Office Server Edition. The Flare Communicator add...
Sponsored By Global Knowledge
-
Four Steps Toward Planning a Successful Email Migration
While migrating email to new hardware can be simple, most migration situations are far more complex. Careful planning and effective management are crucial to controlling the outcome for migration su...
Sponsored By Dell Software
-
SharePoint 2010: Ten Tips for Creating a Collaborative Framework for your Company
SharePoint has consistently increased in complexity over time and now includes new capabilities, such as cloud service and Silverlight development, among a host of other additions. In order to achieve...
Sponsored By Global Knowledge
-
How To Use Workflows In SharePoint
Many organizations have found a place for SharePoint in their networks. Yet while most users are familiar with the sharing and collaboration capabilities in SharePoint, few take advantage of features ...
Sponsored By Global Knowledge
-
Public Folders in Exchange Server 2010: What You Should Know
There will come a time when Exchange Server will be incompatible with Public Folders. For those of you who are using them a lot, there should be a plan in place to move away from them. For those who h...
Sponsored By Global Knowledge
-
The Importance of Email Continuity
Email is more than just a communication tool. It’s a repository for critical – even sensitive – business information. Therefore, having continuous email access is vitally important, and any outage – ...
Provided By Dell Software
-
Optimize Email Security
Spear-phishing, cost concerns, exploding spam rates, data loss, increasing compliance requirements, and cloud-based deployment options may have you reevaluating your current email security solution. W...
Provided By AU: McAfee
-
Gartner Magic Quadrant for Secure Email Gateways
McAfee Positioned in the Leaders Quadrant of the Gartner Magic Quadrant for Secure Email Gateways. With spam still representing 75% of email and email viruses, and targeted phishing attacks and ransom...
Provided By AU: McAfee
-
The Move to Exchange 2013: Migraine or Migration?
Whether to migrate your mission-critical Exchange messaging solution is not always an easy decision, depending on your current environment. And executing a successful and trouble-free migration is far...
Provided By Dell Software
-
Whitepaper: Bandwidth Bandits
Your company’s internet link is precious. Not only is it expensive and limited but it is a vital business tool. Yet our analysis shows that companies can lose around a quarter of their internet bandwi...
Provided By Symantec Australia
-
Whitepaper: Legal Compliance in Electronic Record Keeping
Your mail server can only retain so much of your email - if these volumes are not monitored, the server will slow down and over time run out of space. However Deleting emails means your organization i...
Provided By Symantec Australia
-
The future of email and application is social
This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into th...
Provided By IBM
-
IDC Report: The Future of eMail is Social
This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by t...
Provided By IBM
-
Automating and Securing Healthcare Information with Cloud-Based Fax Messaging
Federal guidelines are driving healthcare providers to automate the processing of patient-related information. Using internal fax infrastructures to manage healthcare information is becoming more cost...
Provided By OpenText
-
Ditch your spreadsheets & download a FREE IP Address Management Tool!
Free IP Address Tracker from SolarWinds lets you track an unlimited number of IP addresses giving you a unified view of your entire IP address space. Now you can see which IP addresses are in use an...
Provided By SolarWinds
-
The Future of email and application is social
This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into th...
Provided By IBM
-
IDC Report: The Future of eMail is Social
This IDC white paper takes a look at the current state of enterprise email and the perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work ...
Provided By IBM
-
The future of email and applications is social
Email will retain relevance as a key business collaboration tool by evolving toward a more integrated approach with these newer tools. IBM Notes and Domino is the right platform for creating social em...
Provided By IBM
-
Trust Management in P2P Networks Using Mamdani Fuzzy Inference Systems
Peer to Peer (P2P) systems are one of the popular distributed systems which are used in many areas of communication for many years. This is because P2P systems are autonomous systems where any number ...
Provided By International Journal of Computer Applications
-
Behavioral Analysis of a Proposed Reputation System for Peer-to-Peer Network
Peer-to-Peer (P2P) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A P2P network provides a scalable and fault-tolerant...
Provided By International Journal of Computer Applications
-
Evaluation and Study of Transition Techniques Addressed on IPv4-IPv6
IPv4/IPv6 transition rolls out many challenges to the world of internet. IETF proposes various transition techniques including dual IP stack, IP translation and tunneling transition mechanisms. A deta...
Provided By International Journal of Computer Applications
-
Performance Analysis of Chord Protocol for Peer to Peer Overlay Topology in Wireless Mesh Network
Peer-to-Peer (P2P) applications have been extensively used for file sharing and accounts for more than 70% of the traffic in the internet. The inherent characteristics of P2P make it advantageous in c...
Provided By International Journal of Computer Applications
-
The legal and commercial risks and issues to consider when managing emails
Email has become an important tool in the preparation of legal advice and has replaced documentation as the primary method of delivering that advice. But growing e-discovery, compliance and knowledge ...
Provided By Mimecast
-
The Interactive Archive: Making your email archive work harder
The concept of an Interactive Archive delivered from the cloud requires a new way realising value in a computing platform. The Interactive Archive is one that will be deployed from the cloud, but not ...
Provided By Mimecast
-
On-demand Webcast: 5 Online Collaboration Tips for Small Businesses
Don’t allow lack of size and resources to be a competitive disadvantage. No matter how modest your workforce, you have the ability to scale by taking advantage of the right technologies. For example: ...
Provided By ShareFile
-
Analysis of Fault Tolerance in Peer to Peer Video on Demand System Using V Chaining
The video on demand system is one of the streaming applications widely access remote video programs over the Internet. One of the variant of VoD system is Peer-To-Peer (p2p) system. In P2P VoD system ...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Top 10 Steps to Ensure a Successful Migration to Exchange 2013
Are you ready to make the move to Exchange 2013? Good idea - it delivers improved administration, better security, reduced operating costs and much more. However, without proper planning, it could pot...
Sponsored By Dell Software
-
CRUSH IP CONFLICTS! Download a FREE IP Address Management Tool!
Stop wasting precious time with error-prone, home-grown IP address tools and spreadsheets that lead to costly IP address conflicts. Quickly and easily figure out which addresses are available and whi...
Sponsored By SolarWinds
-
SharePoint 2010: Ten Tips for Creating a Collaborative Framework for your Company
SharePoint has consistently increased in complexity over time and now includes new capabilities, such as cloud service and Silverlight development, among a host of other additions. In order to achieve...
Sponsored By Global Knowledge
-
IPO 8.1 Brings Significant Changes to the IP Office Communication Solution
IP Office Server Edition R8.1 brings significant changes to the IP Office product offering. It opens up access to mid-market opportunities with the IP Office Server Edition. The Flare Communicator add...
Sponsored By Global Knowledge
-
Optimizing Microsoft Exchange for the Enterprise: Hub Transport Server and Lync-SharePoint Integration
In this white paper, we will look at Optimizing the Hub Transport Server, Miscellaneous Features, and Lync-SharePoint Integration of Microsoft Exchange for the Enterprise. First we examine configurati...
Sponsored By Global Knowledge
-
Enable UC with BlackBerry Mobile Voice System & BlackBerry Enterprise Instant Messaging
Unified Communications connect individuals, real-time information and teams, enabling effective collaboration when and where it needs to happen. In this webcast, find out exactly how BlackBerry® Mobil...
Sponsored By BlackBerry
-
Public Folders in Exchange Server 2010: What You Should Know
There will come a time when Exchange Server will be incompatible with Public Folders. For those of you who are using them a lot, there should be a plan in place to move away from them. For those who h...
Sponsored By Global Knowledge
-
Enabling Collaboration with BlackBerry Work Drives, Cisco WebEx and Microsoft SharePoint
Employees today need to connect quickly with people, content and resources to get work done. Often, that requires collaboration across departments, geographies, and other enterprises. Learn how BlackB...
Sponsored By BlackBerry
-
How To Use Workflows In SharePoint
Many organizations have found a place for SharePoint in their networks. Yet while most users are familiar with the sharing and collaboration capabilities in SharePoint, few take advantage of features ...
Sponsored By Global Knowledge
-
Say Goodbye to Spreadsheets & Hello to Simplified IP Address Management
With SolarWinds® IP Address Manager (IPAM), you can finally ditch those outmoded spreadsheets and the problems that come along with them for the reliability and scalability of an automated and consoli...
Sponsored By SolarWinds
-
Test Drive the Interactive Online Demo – No Registration Required!
Static spreadsheets and home-grown IP address management tools just don't cut it in today’s increasingly dynamic networks. Experience a better solution when you visit SolarWinds IP Address Manager on...
Sponsored By SolarWinds
-
10 Reasons Why Documents and Spreadsheets Are Killing Your Career
Using documents and spreadsheets for requirements definition and management can be pretty painful at times, but have you considered that these tools might actually be killing your career?Take a look a...
Sponsored By Blueprint Software
-
Become a social business in the cloud IBM SmartCloud for Social Business collaboration services
Help create business value by becoming a social business in the cloud. IBM SmartCloud for Social Business social collaboration services provide integrated email, social business capabilities and third...
Sponsored By IBM
-
SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis
While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capa...
Sponsored By IBM
-
Transforming spreadsheets: planning, budgeting and forecasting for midsize companies
A spreadsheet-based approach to performance management won't meet the challenges facing growing midsize businesses. You need confidence in the information you're using for critical decision-making. Re...
Sponsored By IBM
-
Ditch Your Manual IP Address Tracking Spreadsheets
IP address management via spreadsheets has many weaknesses and is quickly becoming outmoded. The fact is static spreadsheets are just no match for today’s dynamic networks. One great alternative to ...
Sponsored By SolarWinds
-
Learn How To Be an IP Address Management Ninja
Break free of spreadsheets once and for all and start managing your network like an IPAM ninja master! Learn about automation, consolidation, and control so you can become an IP address management nin...
Sponsored By SolarWinds
-
Cisco Service Provider Next Generation Networks
What is Cisco Service Provider Next Generation Networks (IP NGN) and why do we care? This white paper will answer those questions and look at some of the technologies that are used within those networ...
Sponsored By Global Knowledge
-
Four Steps Toward Planning a Successful Email Migration
While migrating email to new hardware can be simple, most migration situations are far more complex. Careful planning and effective management are crucial to controlling the outcome for migration su...
Sponsored By Dell Software
-
The Virtual Brand Footprint: The Marketing Opportunity In Second Life
Every media outlet - television, radio, print and internet - presents a unique set of best practices for brand marketers to follow. These tried and tested approaches are part of a larger communication...
Provided By Aplomb Software
-
Small World P2P Overlay for Video Sharing Service
Measurement studies of YouTube show that there are some distinctive properties regarding to video sharing service, e.g., small clip size, suggestion links between related clips. This observation motiv...
Provided By University of Science and Technology Houari Boumediene
-
A Consistency Protocol Multi-Layer for Replicas Management in Large Scale Systems
Large scale systems such as computational Grid is a distributed computing infrastructure that can provide globally available network resources. The evolution of information processing systems in Data ...
Provided By University of Oran
-
Inter Domain Packet Filters for IP Spoofing Attacks
The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. Even Prevention mechanisms are attacked by the ability of attackers to forge or spoof the sou...
Provided By QIS College of Engineering and Technology
-
Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks
Designing efficient search algorithms is a key challenge in unstructured peer-to-peer networks. Flooding and Random Walk (RW) are two typical search algorithms. Flooding searches aggressively and cove...
Provided By QIS College of Engineering and Technology
-
Dynamic Search Algorithm Used in Unstructured Peer-to-Peer Networks
Designing efficient search algorithms is a key challenge in unstructured peer-to-peer networks. Flooding and Random Walk (RW) are two typical search algorithms. Flooding searches aggressively and cove...
Provided By QIS College of Engineering and Technology
-
A Novel Fuzzy Logic Base Scheduling Mechanism for Service Differentiation in IP Networks
Quality of Service (QoS) refers to a set of rules or techniques that help the network administrators use the available network resources optimally to manage the effects of congestion and to treat the ...
Provided By Azad University
-
Study of Reputation Based Defense Mechanism in Peer To Peer Live Streaming
Peer-to-peer live video streaming systems are having more popularity as the information technology is advancing fast. Peer-to-peer live video streaming systems are like peer-to-peer file sharing syste...
Provided By International Journal of Computer Science Issues
-
Dynamic Reputation Based Trust Management Using Neural Network Approach
Multi-agent systems like Peer-To-Peer (P2P) Networks employ scalable mechanisms that allow anyone to offer content and services to other system users. The open accessibility of these networks makes th...
Provided By International Journal of Computer Science Issues
-
On Improving the Reliability of Cluster Based Voice Over IP Servers
The IP Multimedia Subsystem world (IMS) is a complex system involving critical stateful devices required to be highly available. Among the critical components in the IMS infrastructure is the Session ...
Provided By Universite de Lyon
-
Real-Time Modeling and Simulation of Traffic
Recent advancement in computer technology have led to the widespread creation and use of simulation models in variety of fields. Prior to the development of simulation models, planning and improvement...
Provided By Hanoi University of Technology
-
A Comparative Analysis on Performance of Route Optimization With Security in Mobile IPv6
Mobile IPv6 has become a critical protocol which allows mobile nodes to receive seamless services continuously while they move. There are two methods for the communication between the mobile node and ...
Provided By Hanoi University of Technology
-
Employee Performance Management Today: Typically A Burden
For most small to mid-sized companies, the employee performance management process is one of the least liked and least valued processes. While nearly every company conducts performance reviews, and ev...
Provided By Jakoba Software
-
Algorithm for Layered Sorting and Merging of P2P Information Retrieval
Due to the intrinsic characteristics, P2P information retrieval has faced quite a few challenges, and it is one of the urgent problems how to sort and merge the retrieval results from multiple nodes. ...
Provided By Hunan University
-
SWP2P: P2P Anonymous Trace System Based on Superposition Watermarking
A lot of attention has been paid to anonymity due to the users' privacy protection. While Peer-To-Peer (P2P) networks need anonymity capacity, the authority also requires partner traceability to preve...
Provided By Hunan University
-
Usage of Erlang Formula in IP Networks
This paper is concerning of Erlang formulas practical approval and their usage with video flow transfer in IP networks. Erlang formulas were simulated in MATLAB program. Practical verification was rea...
Provided By Scientific Research Publishing
-
Maximizing Resilient Throughput in Peer-To-Peer Network
A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to consider fault resilien...
Provided By Scientific Research Publishing
-
Improving Content Availability by Request-Adaptive Incentive in Private Peer-to-Peer Communities
Recently, BitTorrent (BT) communities are rapidly evolving towards Private Torrent (PT) sites. The efficiency of such content sharing system depends on how well it can satisfy the requirements of user...
Provided By University of Airlangga
-
Small Biz Tech: Tools for Your Business
With so many products on display at CES, one may have a hard time figuring which ones may be the perfect fit for the business. The presenter, the editor of smallbiztechnology.com, tells one which high...
Provided By American Express Company
-
Query Evaluation in P2P Systems of Taxonomy-Based Sources: Algorithms, Complexity, and Optimizations
In this paper the authors address the problem of answering queries over a peer-to-peer system of taxonomy-based sources. A taxonomy states subsumption relationships between negation-free DNF formulas ...
Provided By University of Crete
-
File Transfer IPv6 Readiness
The world is out of IPv4 addresses and the time of IPv6 is at hand. This paper explores existing file transfer technology used for bulk data exchange under the lens of IPv6 and highlights issues to co...
Provided By File Transfer Consulting