Archive for February, 2011

It’s hard to imagine, but roughly 10 years ago as VoIP was being rolled out corporate networkers were quite concerned about the security of VoIP. As we faced a move from voice going over a traditional (and, by the way, unencrypted) network, there was concern that VoIP would be much too easy to eavesdrop on – especially if it traversed the Internet.

It’s hard to imagine, but roughly 10 years ago as VoIP was being rolled out corporate networkers were quite concerned about the security of VoIP. As we faced a move from voice going over a traditional (and, by the way, unencrypted) network, there was concern that VoIP would be much too easy to eavesdrop on – especially if it traversed the Internet.

It’s hard to imagine, but roughly 10 years ago as VoIP was being rolled out corporate networkers were quite concerned about the security of VoIP. As we faced a move from voice going over a traditional (and, by the way, unencrypted) network, there was concern that VoIP would be much too easy to eavesdrop on – especially if it traversed the Internet.

Today we’d like to share several reports hosted by Webtorials. The first is a 2011 State of the Market report on UC and Cloud Based Services for SMBs. The second companion piece is a second Webtorials State of the Market report on SMB Communications Plan and Priorities.

Today we’d like to share several reports hosted by Webtorials. The first is a 2011 State of the Market report on UC and Cloud Based Services for SMBs. The second companion piece is a second Webtorials State of the Market report on SMB Communications Plan and Priorities.

 Page 2 of 18 « 1  2  3  4  5 » ...  Last »