Collaboration

Get the tips and best practices for implementing, adapting, and changing the collaboration framework in your company.

  • White Papers // Aug 2014

    Storing and Archiving Big Data - Sanofi Case Study

    This Case Study looks at how Sanofi implemented EMC's InfoArchive solution and in the initial phase archived over 100 applications and 10 million documents, integrated 4,000 applications to new data centers and increased storage utilization by 30%. Download this case study to learn more about how InfoArchive provided Sanofi the...

    Sponsored By EMC

  • Case Studies // Aug 2014

    Reducing Cost for Archiving - Jaguar Land Rover Case Study

    Jaguar Land Rover was facing storage and infrastructure costs related to business applications They also needed to manage structured and unstructured data. Learn how EMC InfoArchive helped JLR implement a scalable, unified platform and project-based archiving system for easy and fast retrieval of structured and unstructured data.

    Sponsored By EMC

  • White Papers // Aug 2014

    Forrester Report: Build a Better Business Case for UC

    This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely...

    Sponsored By ShoreTel

  • White Papers // Jul 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • Webcasts // Jul 2014

    Live Webcast: The Significance of Story in Powerful Presentations

    Join us for this LIVE event! Wednesday, September 10, 2014 11 AM (PDT) / 2 PM (EDT) Speaker:Kelly Loosli, Animation Producer and Co-Creator of the Internationally Recognized Animation Program at Brigham Young University. There’s no denying the power of a good story. Our fascination with storytelling fuels the fire of...

    Sponsored By Citrix Online

  • White Papers // Jul 2014

    Five Key Issues for DNS - The Next Network Management Challenge

    The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers).  Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates...

    Sponsored By F5

  • White Papers // Jul 2014

    The Real SaaS Manifesto to Benefit Your Business

    Business software delivery models have evolved tremendously over the last decade, from on-premise implementations to off-site hosting to Software-as-a- Service (SaaS). Unfortunately, due to the proliferation and incorrect use of the term, SaaS has often been misunderstood by both software vendors and business people. The purpose of this document is...

    Sponsored By Workday

  • White Papers // Jun 2014

    Headsets Mean Advantages for All

    Despite using multiple communication touchpoints everyday, studies show that nothing is more effective than voice at getting your point across.Headsets not only improve voice communication on calls, they also offer business benefits right the way across the enterprise. But as with all new technologies, some people will still need convincing....

    Sponsored By Plantronics

  • White Papers // Jun 2014

    Improve your Unified Communications ROI

    IT decision makers concentrate hard on vintegrating real-time tools like instant messaging and voice and video conferencing with voicemail, email and text messages, they neglect the emotional and informational needs of the end user. The result? Your company has made a significant investment on a flawless UC platform and cutting...

    Sponsored By Plantronics

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Jun 2014

    Fundamentals of the PKI Infrastructure

    Securing corporate information can be a challenge, considering the numerous technologies and platforms that need to be protected. One technology that definitely helps achieve secure data is public key infrastructure (PKI), which enhances the security of data by using advanced access methods and making sure the authenticity of the data...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Windows 8.1 Client to Microsoft's Cloud Services

    Over the past several years, Microsoft has reinvented its enterprise technologies in its push toward the cloud. Windows 8 is a key part of making Microsoft customers and devices cloud-ready for the next generation of technology. With Microsoft cloud services such as Office 365, Office Web Apps, and SkyDrive, Windows...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    The New World of Collaboration

    The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now...

    Sponsored By Box

  • Case Studies // Jun 2014

    Dynamic Systems - SkySync Case Study

    Midsize construction company uses Box to collaborate with partners, but uses SharePoint internally. They used SkySync to sync partner portals in Box with SharePoint -- while matching SharePoint's existing security settings and folder structures. Construction company, midsize company, midmarket, SharePoint, SkySync, partner portal, NA, security.

    Sponsored By Box

  • White Papers // May 2014

    Case Study: Heritage Bank improves reliability and productivity with Fuji Xerox MPS

    A case study that discusses on how to improve productivity and service delivery. Explore the benefits of adopting multifunction devices and learn how Heritage Bank significantly improved service quality.

    Sponsored By Fuji Xerox

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Apr 2014

    eBook Series: The Changing Landscape of Technology Services

    Technology changes in the blink of an eye. New products or services are introduced and older versions are obsolete almost immediately. The convergence of Mobile, Big Data, and the Cloud is setting the stage for a new way of working, collaborating and leveraging business information. Learn more about how you...

    Sponsored By ConnectWise

  • White Papers // Feb 2014

    Next-Gen Security

    SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    NSA Series Data Sheet

    Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    IDC: Driving Business Optimization with End-to-End Performance Testing White Paper

    The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. The document defines an application performance testing framework, discusses a performance test evolution path and explores the relationship...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2014

    Five Ways Box Makes SharePoint Better

    Businesses around the world have made significant investments in Microsoft SharePoint for content management. However, these same companies are struggling with making the transition to a more mobile, more collaborative workplace. The biggest barriers to making this shift are the lack of strong mobile support in SharePoint, a lack of...

    Sponsored By Box

  • White Papers // Jan 2014

    Empowering Your Mobile Workers White Paper

    A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

    Sponsored By Box

  • White Papers // Jan 2014

    Driving Enterprise Transformation with Box and Office 365

    Today, there is a gap growing between the expectations of end-users for simple, effortless apps in the workplace and the requirements of IT to protect content with enterprise-grade security. To cope with these conflicting trends, many organizations are now investing in an ecosystem of cloud applications and services. This is...

    Sponsored By Box

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Jul 2013

    File Sharing: Risk or Remedy?

    Ever-increasing file sizes. Document-centric, complex collaboration needs. Two big reasons organizations are turning to cloud file sharing (CFS) as a lightweight but effective solution. Read this complimentary report and learn more about: Document-centric collaboration and how to complement your existing ECM ecosystem with CFM applications Feature...

    Sponsored By Box

  • White Papers // Jul 2014

    Maximize your UC&C Outcomes

    Unified communications and collaboration (UC&C) solutions like Microsoft® Lync® are transforming the workplace. With presence, real-time voice, HD video, and rich collaboration capabilities seamlessly integrated into their office productivity suite, today’s employees can engage customers and connect with colleagues and partners from anywhere, at any time, using any device. Read...

    Provided By HP US

  • White Papers // Jul 2014

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Provided By IBM

  • White Papers // Jul 2014

    The future of email and applications is social

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

    Provided By IBM

  • White Papers // Jul 2014

    UART Soft-Core - Independent Customizable-Platform

    In this paper, the authors propose a technique for software-implementation of an UART (Universal-Asynchronous-Receive-Transmit) with the goal of getting a customizable UART-core which can be used as a module in implementing a bigger system irrespective of one's choice of implementation platform. Here they have written the core in VHDL (VHSIC...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • eBooks // Jun 2014

    Executive's guide to the hybrid cloud (free ebook)

    Hybrid clouds are helping enterprises find a balance between their internal IT infrastructure and public cloud services. This guide looks at the business advantages -- and potential deal-killers -- of hybrid cloud strategies.

    Provided By TechRepublic

  • White Papers // Jun 2014

    IBM MobileFirst Collaboration Services service profile

    In an increasingly mobile and far-flung business world, unified communications and collaboration (UCC) is becoming a must-have capability. By converging voice, data and video communications, UCC provides instant messaging, softphones, online meetings and other capabilities to improve productivity while reducing costs for travel and telecommunications. Read this service profile to...

    Provided By IBM

  • White Papers // Jun 2014

    Whitepaper: Datacom cloud email archiving

    Automatically, affordably and securely store messages to have instant access to critical emails when you need them.Find out more about email archiving in this informative whitepaper.

    Provided By EMC

  • White Papers // Jun 2014

    Comparative Analysis of Conventional IP Network and MPLS Network over VoIP Application

    Multi-Protocol Label Switching (MPLS) is the latest technology in the evolution of routing and forwarding mechanisms for the core of the Internet. It ensures the reliable delivery of the Internet services with high transmission speed and lower delays. Traffic Engineering (TE) in MPLS is used for effectively managing the networks...

    Provided By Creative Commons

  • White Papers // Jun 2014

    The Top 10 Steps to Ensure a Successful Migration to Exchange 2013

    This report takes a detailed look into the best way to better manage the migration to Exchange and how Dell’s migration solution can help you mitigate the risk and eliminate the impact on your end users.

    Provided By Dell Software

  • White Papers // Jun 2014

    Using Video to Gain a Competitive Advantage: A Business Strategy for Mid-Market Companies

    Video collaboration solutions can help small- to medium-sized companies reduce downtime by 25%. They can also help companies reduce time-to-market by 24%.* The ROI is strong for mid-market companies investing in video. This Cisco-sponsored white paper from AVI-SPL will help you plan a video-enabled workplace. Discover how video...

    Provided By AVI-SPL

  • White Papers // Jun 2014

    Take control of large file sharing services

    Bloor Research outlines best practice for large file sharing in the enterprise and assesses current vendors.

    Provided By Mimecast

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Provided By Mimecast

  • White Papers // Jun 2014

    The Importance of Continuity in Office 365

    Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?

    Provided By Mimecast

  • White Papers // Feb 2014

    Next-Gen Security

    SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    NSA Series Data Sheet

    Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines.

    Sponsored By Dell Software

  • White Papers // Sep 2014

    SDN: A Pragmatic Approach to Increasing Network Agility from HP Network Services

    The promise of software-defined networking (SDN) goes well beyond increased automation. Its true value is its ability to free IT to focus on the quality-of-business experience—rather than on network operations—in order to enable more innovation. This is the network of the future, and if you start preparing for it today,...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    HP Powers Test Equipment for The Technology Revolution

    Read what the Director of IT Infrastructure at Teradyne has to say about HP’s solutions for his company. Teradyne is a leader in the field of automatic test equipment, with business lines that develop test solutions for wireless products, semiconductors and systems. HP is the sponsor of this material....

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jul 2014

    The Real SaaS Manifesto to Benefit Your Business

    Business software delivery models have evolved tremendously over the last decade, from on-premise implementations to off-site hosting to Software-as-a- Service (SaaS). Unfortunately, due to the proliferation and incorrect use of the term, SaaS has often been misunderstood by both software vendors and business people. The purpose of this document is...

    Sponsored By Workday

  • White Papers // Jun 2014

    The New World of Collaboration

    The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now...

    Sponsored By Box

  • White Papers // Jan 2014

    Driving Enterprise Transformation with Box and Office 365

    Today, there is a gap growing between the expectations of end-users for simple, effortless apps in the workplace and the requirements of IT to protect content with enterprise-grade security. To cope with these conflicting trends, many organizations are now investing in an ecosystem of cloud applications and services. This is...

    Sponsored By Box

  • Case Studies // Jun 2014

    Dynamic Systems - SkySync Case Study

    Midsize construction company uses Box to collaborate with partners, but uses SharePoint internally. They used SkySync to sync partner portals in Box with SharePoint -- while matching SharePoint's existing security settings and folder structures. Construction company, midsize company, midmarket, SharePoint, SkySync, partner portal, NA, security.

    Sponsored By Box

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Sponsored By Cisco Systems

  • eBooks // Sep 2014

    Blue Coat's Encrypted Traffic Management Interactive E-Guide

    According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to...

    Sponsored By Blue Coat Systems

  • eBooks // Sep 2014

    Stop Attacks Hiding Under the Cover of SSL Encryption

    Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.

    Sponsored By Blue Coat Systems

  • Analyst Briefings // Sep 2014

    The Business Value of Social Content

    Analyst report from Forrester on how leading organizations are investing in integrated collaborative and social solutions, and find out how to develop a strategy that will drive the most value for your business.

    Sponsored By IBM

  • Analyst Briefings // Sep 2014

    The Digital Front Office: Enabling Customer Self Service with Enterprise Content Management

    An analyst paper from Frost & Sullivan that outlines the changing nature of the workplace and the customer experience and highlights the benefits of an enterprise content management solution with suggestions for vendor selection and deployment of best practices.

    Sponsored By IBM

  • White Papers // Sep 2014

    Customer Service: Exploit the Value of Content to Drive Service Quality and Customer Satisfaction

    Great service is delivered one customer at a time and improving interactions across all channels means truly understanding customer wants and needs. Massive amounts of unstructured data exist in your organization and can deliver customer insight that is specific, relevant and actionable. Learn how to harness that data to provide...

    Sponsored By IBM

  • White Papers // Aug 2014

    Identity Management in an interconnected world: When Millions need access

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Sep 2014

    Managing the BlackBerry Transition

    The BlackBerry enterprise mobile solution always included a powerful management and security platform for its devices. As you transition to multiple mobile platforms, you face a host of security and management challenges Discover how to address those challenges with Citrix XenMobile.

    Sponsored By Citrix Online

  • White Papers // Aug 2014

    Forrester Report: Build a Better Business Case for UC

    This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely...

    Sponsored By ShoreTel

  • White Papers // Sep 2014

    Ovum Report: New Versions of IBM Notes and Domino Show Microsoft the Way Forward

    Ovum's assessments of IBM's collaboration portfolio over the last four years have put IBM ahead of the field in terms of technical capability. Read how Ovum believes this momentum will translate to improved market leadership for IBM Notes and Domino as well.

    Sponsored By IBM

  • White Papers // Sep 2014

    Evolving Toward the Next Phase of Email

    According to most corporate decision makers and influencers, email is the single most important application they have deployed! The typical user spends two hours per day working in the corporate email system and sends or receives a median of 130 emails per day. Moreover, email is the primary method for:...

    Sponsored By IBM

  • White Papers // Sep 2014

    Improving Collaboration by Adding Social Capabilities to Email

    This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all...

    Sponsored By IBM

  • White Papers // Sep 2014

    Making Business Communication More Productive: The Impact of Better Collaboration in the Mid-Market

    This white paper explores why and how mid-market organizations are confronting these business communications and collaboration challenges. It provides results from a recent study to help companies benchmark their progress as well as offers guidance on choosing the right solutions to address specific communications and collaboration needs. Read more... ...

    Sponsored By HP

  • White Papers // Aug 2014

    2013 Threat Report

    This report extensively details and categorizes recent global trends in network threats. The Dell SonicWALL Threat Research Team detected and prevented more than 1.06 trillion IPS related incidents and blocked more than 1.78 billion malwares downloads.

    Sponsored By Dell Software

  • Webcasts // Sep 2014

    Live Webcast: Surviving Workplace Zombies

    Join us for this LIVE event! Tuesday, October 7, 2014 10 AM (PDT) / 1 PM (EDT) No doubt you’ve seen them. Office zombies. The mindless, slow, de-motivated, disconnected people who try to drag you down to their level. In some workplaces they are rare while in others they swarm...

    Sponsored By Citrix Online

  • White Papers // Aug 2014

    Overcoming Exploits that Use Advanced Evasion Techniques and SSL Encryption

    To defend against today’s advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.

    Sponsored By Dell Software

  • White Papers // Sep 2014

    How We Define a Network is about to Change, Again

    VMware NSX does for networks and physical network components what virtual machines did for data centers and physical servers. It allows you to use them in very different and more flexible ways. In this white paper, you’ll learn how VMware NSX changes the way you build, manage, and secure your...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    Blue Coat SSL Visibility

    To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.

    Sponsored By Blue Coat Systems

  • White Papers // Sep 2014

    Buyer Brief- Improving the Management and Governance of Unstructured Data

    Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition

    Sponsored By IBM

  • Downloads // Jan 2010

    Build a simple timesheet in Excel

    Excel makes it easy to set up a system for tracking time. This download includes a PDF explaining the steps (also available as an entry in our Microsoft Office blog) and a sample timesheet you can customize to fit your needs.

    Provided By Susan Harkins

  • Tools & Templates // Jan 2006

    Build your own consulting contract using this sample form

    Both independent consultants and their clients benefit when they're working with a solid contract. Download this sample contract from TechRepublic member and IT consultant Randy Barger as a guide for preparing your next consulting agreement. E-mail makes it easy to assume a fairly informal relationship with your clients. But...

    Provided By TechRepublic

  • eBooks // Jun 2014

    Executive's guide to the hybrid cloud (free ebook)

    Hybrid clouds are helping enterprises find a balance between their internal IT infrastructure and public cloud services. This guide looks at the business advantages -- and potential deal-killers -- of hybrid cloud strategies.

    Provided By TechRepublic

  • Downloads // Jun 2006

    IP subnetting made easy

    IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. After years of watching confused students struggle through school and in practice when dealing with subnetting, TechRepublic's George Ou created a simple, graphical approach that...

    Provided By George Ou

  • eBooks // Mar 2014

    6 Secrets to Offering Exceptional Customer Service

    The vast majority of people are not experiencing great service. Nearly a third of consumers believe that businesses are now paying less attention to providing good customer service. On top of that, just 7% of those polled say that customer service experiences they have with companies typically exceed their...

    Provided By Salesforce.com

  • White Papers // Feb 2014

    Google Apps for Business - Simple, Proven, Transformative

    1-page overview of the benefits provided by Google Apps for Business. How Google Apps for Business helps users work better together while bringing you the benefits of pure cloud. Learn why 5 million businesses have gone to Google Apps for Business to lower costs and liberate IT. Download this quick...

    Provided By Google

  • Downloads // Apr 2012

    10 cool conditional formatting techniques: Excel demo files

    These sample Excel workbooks (xls and xlsx versions) illustrate the creative conditional formatting techniques described in this 10 Things blog post.

    Provided By Susan Harkins

  • White Papers // Jul 2014

    Maximize your UC&C Outcomes

    Unified communications and collaboration (UC&C) solutions like Microsoft® Lync® are transforming the workplace. With presence, real-time voice, HD video, and rich collaboration capabilities seamlessly integrated into their office productivity suite, today’s employees can engage customers and connect with colleagues and partners from anywhere, at any time, using any device. Read...

    Provided By HP US

  • White Papers // Mar 2013

    SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis

    While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capabilities, using spreadsheets can be risky. Read this paper to learn about more powerful yet...

    Provided By IBM

  • Downloads // Sep 2012

    10 tips for summarizing Excel data: Demo files

    These sample Excel workbooks (xls and xlsx versions) illustrate the summarizing techniques described in this 10 Things blog post.

    Provided By Susan Harkins

  • White Papers // Feb 2014

    Research - Google Apps ranked #1 by Radicati

    The Radicati Group has done some homework for companies choosing a cloud business email provider. In a report entitled “Cloud Business Email - Market Quadrant 2013”, the firm ranks Google Apps for Business ahead of all other players. A summary of Radicati’s findings can be downloaded here. Download this quick...

    Provided By Google

  • Downloads // Jan 2006

    Troubleshoot 10 common Exchange problems with these expert answers

    This list outlines 10 common Exchange problems and solutions. This handy two-page list outlines 10 familiar Exchange problems and an assortment of solutions. From user access errors to mail delivery problems, this list is great quick reference for every Exchange administrator.Here's a sample:Number 1: Users cannot access server. -...

    Provided By TechRepublic

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec