RSS feed Get our RSS feed

News by Topic

communications services

Results 76 - 94 of 94Sort Results By: Published Date | Title | Company Name
By: iDirect     Published Date: Aug 21, 2009
The global demand for voice and data services delivered over cellular networks continues to grow as new markets open and existing ones increase capacity. The networking infrastructure to support subscriber growth and new services have experienced aggressive expansion as the worldwide economy evolves.
Tags : infrastructure, gsm, cellular, telecom, telecommunications, networking infrastructure, network expansion, voice services
     iDirect
By: MBG     Published Date: Aug 21, 2009
While overall costs for telecommunications services have been going down, the consumption of these services by corporations is on the rise. This white paper explores how corporations can manage the consumption of telecom services by implementing polices designed to impact behavior that can lead to lower costs.
Tags : phone, telecom, telecommunications, communications, it spending, cost control, phone bill, voip
     MBG
By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity
     Reactivity
By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : quocirca, isp, isps, internet service provider, convergence, ip telephony, voip
     Quocirca
By: Interactive Intelligence     Published Date: Feb 26, 2013
Insurers are renewing their focus on top line growth-seeking ways to increase premium volumes while at the same time improving profitability. Properly interacting with customers creates revenue on all ends. Read on to learn about key user interaction
Tags : integrated content, communications, key business issues, points of contact, upselling, account management, client services, crm & customer care
     Interactive Intelligence
By: Interactive Intelligence     Published Date: Sep 11, 2013
Cloud communications provide myriad benefits for organizations, including speed of deployment, the ability to future-proof infrastructure and applications, business continuity, predictable monthly payments, and many more. Most organizations turn to the cloud in order to cost-effectively access enhanced capabilities while eliminating the complexity of deploying and managing premises-based solutions. Cloud-based contact center solutions offer additional benefits, notably the ease of adding or removing agents as needed based on fluctuating or seasonal traffic, ease of deploying remote or at-home agents, and ease of adding multi-channel services.
Tags : interactive intelligence, contact centers, organizations, deployment, cloud, solutions, seasonal traffic, infrastructure
     Interactive Intelligence
By: Asentria Corporation     Published Date: Sep 04, 2007
The use of pollable remote access units enable integration of phone systems with telecommunications management, plus system-wide access, monitoring and alarm notification that includes unmanned remote sites. Few telephone networks connect a user base that is involved in such a multitude of vital services as local government.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : sparta, social network, packet8, internet protocol (voip), social media marketing
     Sparta Social Networks
By: Okta     Published Date: Feb 24, 2015
This report summarizes the most important factors for deciding between Office 365 and on-premises systems to support e-mail, Web-based document sharing, unified and coexistence possibilities for the most important Office 365 services, and summarizes the licensing and purchasing options for large businesses. communications, and other collaboration functions. It summarizes the major business and technical factors for evaluating Office 365, outlines the technical capabilities, migration options, and coexistence possibilities for the most important Office 365 services, and summarizes the licensing and purchasing options for large businesses.
Tags : office 365, on-premises systems, web-based sharing, licensing and purchasing options, technical capabilities, migration options, coexistence
     Okta
By: Sixth Sense Media     Published Date: Apr 14, 2011
This paper will review growth drivers, and outline steps service providers can take to enter a new age of lifecycle marketing and promotions to increase ARPU and address churn.
Tags : mobile subscriber marketing, telecommunications marketing, mobile services marketing, reduce subscriber churn, telecom services, subscriber marketing, customer experience/engagement, mobile marketing
     Sixth Sense Media
By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
This paper examines how seven enterprise and midsize companies spanning the equipment rental, healthcare, retail, research, and telecommunications (service provider) industries were able to reduce their annual IT cost to deliver compute services by 58% by migrating to a blade platform.
Tags : blade, infrastructure, server, virtualization, enterprise, midsize, blade platform
     HP - Intel® Xeon® processors
By: HP and Intel ®     Published Date: May 03, 2013
This paper examines how seven enterprise and midsize companies spanning the equipment rental, healthcare, retail, research, and telecommunications (service provider) industries were able to reduce their annual IT cost to deliver compute services by 58% by migrating to a blade platform.
Tags : blade, infrastructure, server, virtualization, enterprise, midsize, blade platform
     HP and Intel ®
By: eFax     Published Date: Aug 06, 2013
eFax Corporate is part of publicly-traded j2 Global™ Inc. (NASDAQ: JCOM). Founded in 1995, j2 Global provides outsourced, value-added messaging and communications services to individuals and businesses around the world. The Company offers fax, voicemail and document management solutions, Web-initiated conference calling and unified-messaging and communications services.
Tags : efax, value-added messaging, communications services, management solutions, unified-messaging
     eFax
By: IBM     Published Date: Feb 05, 2014
From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn how organizations managed risk, security and compliance with help from IBM.
Tags : 
     IBM
By: Mitel     Published Date: Jan 26, 2016
Mitel and Mavenir have combined to pursue the same vision of communications industry convergence and to provide business critical voice and high value business collaboration services across Mobile and Enterprise networks.
Tags : real time communications, enterprise communication, cloud, high value business collaboration, mobile and enterprise networks
     Mitel
By: Mitel     Published Date: Jun 29, 2016
De nombreuses organisations et entreprises dans le monde entier disposent de pièces vacantes, autrefois remplies de câbles, de boîtes noires et de voyants clignotants. Ces locaux abritent une armoire téléphonique poussiéreuse, ne contenant qu'un seul terminal, ou parfois un baby-foot que les employés du service informatique utilisent pour décompresser. Le cloud, et notamment les communications via le cloud, sont à l'origine de cette transformation qui a bouleversé le paysage informatique. Certains professionnels de l'informatique ont accueilli ce changement à bras ouverts. D'autres préparent la migration progressive de leurs services vers le cloud. D'autres enfin conservent leur solution sur site, par choix ou par nécessité.
Tags : best practices, business optimization, business management, productivity, cloud services, communications
     Mitel
By: Dell EMC     Published Date: Dec 01, 2017
A common misconception about hyperconverged infrastructure (HCI) is that because data services are software-defined, the hardware doesn’t matter. It’s easy to see why—the software driving HCI solutions such as the Dell EMC XC Series (in this case, Nutanix software) is exceptional. It efficiently manages data and communications across a cluster of nodes and storage tiers, keeping the cluster and virtual machines (VMs) up and running, delivering optimal performance and availability. Software-defined infrastructure is changing the way data services are delivered, making companies more efficient and agile, and reducing costs. Download the study to learn more about the latest trends. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
     Akamai Technologies
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
     Darktrace
Start   Previous    1 2 3 4     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics