Video Teleconferencing Standards Reports

Video conferencing security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The video conferencing tool plays a vital role in keeping employees connected and productive, but it can also become an attack target of miscreants. Here are 11 tips to help enterprises adapt to a video conferencing-enabled workforce and host remote meetings in a secure and private manner.
Posted: 28 Sep 2022 | Published: 28 Sep 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to video conferencing and collaboration
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
Posted: 15 Mar 2021 | Published: 01 Mar 2021

TechTarget ComputerWeekly.com

The Future of Conference Rooms
sponsored by Shure Inc
EGUIDE: Today, a new issue has to be considered for the future of conference rooms: We must make people feel safe. This can be achieved through a combination of policy changes, room design changes and new technologies. In this e-guide, learn more about different technologies that can help organizations as they transition to a hybrid workplace model.
Posted: 29 Mar 2021 | Published: 26 Mar 2021

Shure Inc

Questions to ask when evaluating video conferencing service
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide highlights what you should know before implementing video conferencing, including what services you need, key requirements and a guide to evaluating video conferencing service providers.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

Cisco Systems, Inc.

Presentation Transcript: Driving Collaboration Efficiency - H.264 High Profile
sponsored by Polycom, Inc.
PRESENTATION TRANSCRIPT: Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  Read this transcript to learn how Less Delivers Much More!
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Polycom, Inc.

Food Standard's Agency (FSA) Introduce better ways of working with Antenna
sponsored by FourNet
CASE STUDY: FSA was coming out of a contract with their communications provider. They had an increasing need to accommodate remote users and wanted to consider Cloud Services, Networks and Data Centers, user devices and the replacement of their existing video conferencing. Download this case study to see why they decided to implement ANTENNA.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

FourNet

SCOPIA Connector for Microsoft Office Communications Server 2007
sponsored by RADVISION
PRODUCT LITERATURE: RADVISION is extending its support of the Microsoft unified communications product line with the new SCOPIA Microsoft Office Communications Server (OCS) 2007 Connector.
Posted: 09 Jun 2008 | Published: 07 Jun 2008

RADVISION

Securing your Video Conferences: How to Minimize Risks of Hacking
sponsored by Arkadin
WHITE PAPER: This informative guide provides valuable insight on the importance of secure collaboration across the web.
Posted: 11 May 2014 | Published: 09 May 2014

Arkadin

Cisco Prime Collaboration Manager (CM) 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: Uncover the details of Cisco Prime Collaboration Manager to learn how you can gain deeper network visibility, all the way down to the granularity of video flow statistics, to ensure an optimal end-user experience for your users.
Posted: 02 Jul 2012 | Premiered: 04 Nov 2011

Cisco Systems, Inc.

Video conferencing standards and interoperability considerations
sponsored by TechTarget Security
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security