Web Telephony Reports

VoIP has never lost its voice: How to get the most out of your business communications
sponsored by TechTarget ComputerWeekly.com
EBOOK: In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

Improving VoIP Quality and the Impact of Skype for Business Telephony
sponsored by Comcast Business
EGUIDE: In this expert e-guide, learn how to properly architect your VoIP so you can provide users with better quality of voice and support for a number of concurrent voice connections. Additionally, discover how Skype for Business telephony stacks up for enterprises.
Posted: 09 Mar 2017 | Published: 07 Mar 2017

Comcast Business

UC and the Evolution of Enterprise Telephony
sponsored by TechTarget Security
EGUIDE: This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with unified communications (UC).
Posted: 18 Apr 2013 | Published: 18 Apr 2013

TechTarget Security

CPaaS and API: Hottest Trends and Buyer's Guide
sponsored by Bandwidth
EGUIDE: The CPaaS and API market is bustling, with acquisitions and new vendors emerging. Inside, learn about the recent API trends that should be on your radar, and discover a CPaaS buyer's guide that will help you properly evaluate vendors and choose the right CPaaS for your enterprise.
Posted: 14 Jun 2017 | Published: 08 Jun 2017

Bandwidth

Implementing Fax over IP (FoIP) in your Organization
sponsored by OpenText
WHITE PAPER: This white paper discusses how fax servers and new FoIP investments fit into an organization’s overall document delivery strategy. Continue reading to learn why you should implement FoIP in your organization today.
Posted: 07 May 2010 | Published: 07 May 2010

OpenText

Allied Solutions Moves IP Telephony System to CDW Data Center
sponsored by CDW Corporation
CASE STUDY: As part of a larger outsourcing project, Allied Solutions decided to outsource their IP Telephony infrastructure to take advantage of the stability, security, and redundancy that a data center could offer. To achieve this goal, they turned to CDW’s Hosting and Managed Services solutions.
Posted: 08 Sep 2009 | Published: 01 Sep 2009

CDW Corporation

Dialing for Dollars: Nine Tips on Call Prospecting
sponsored by Cisco Systems, Inc.
WHITE PAPER: The truth about effective call prospecting is that it’s a numbers game: the more calls you make, the better your chance of attaining customers. Just one customer could be enough to make your sales numbers. Continue reading this paper to learn nine tips for effective calling.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Cisco Systems, Inc.

Preparing Your Corporate Network For Microsoft Teams Telephony
sponsored by Loopup
WHITE PAPER: As companies look to deploy telephony for Microsoft Teams, they must assess their network requirements for both capacity and quality to ensure they’re suitable for the job. Take the first step – Engage this white paper to learn how calls are handled by Teams and how to tweak your network to optimize the process.
Posted: 15 Mar 2021 | Published: 05 Mar 2021

TOPICS:  IP Telephony
Loopup

Cisco Unified Communications: New Deployment Models for Communications and Collaboration
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this whitepaper for insight on building the best unified communications solution for your business.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Cisco Systems, Inc.

IP telephony trends: Migrating from PSTN to SIP trunking
sponsored by TechTarget Security
EGUIDE: Uncover the top five trends in enterprise IP telephony and learn the benefits and challenges of replacing PSTN with SIP-based services.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

TechTarget Security