Industry insider news for Australia's technology resellers
These search results are from across the Techday Network of sites
Meeting Solutions Magic Quad - The Leaders' pros and cons
LogMeIn, Zoom, Microsoft and Cisco are ‘Leaders’ in the Gartner Meeting Solutions Magic Quadrant. We look at the strengths and cautions for each.
Avaya's partners to exclusively distribute new meetings platform
The service aims to bring participants together from around the globe, across different systems and devices without investments in new infrastructure.
HD video communication outside the boardroom
It's comes as no surprise that organisations the world over are keenly exploring the opportunities offered by high definition video conferencing.
Lifesize on winning streak with enterprise video applications
Lifesize has released two new icon video systems as well as updates to the Lifesize Cloud service, and has recently received a Frost and Sullivan award.
Lifesize Cloud: Now you’re talking with video conferencing…
Video conferencing has come of age and is used in every industry, with video and audio telecommunications experts Lifesize at the heart of the market.
Lifesize goes SaaS-y with new offering
"ANZ is much more advanced than other places in cloud adoption, and this is perfect for mid-market companies, which fits well with New Zealand."
LifeSize video offerings
The business benefits of videoconferencing — and its easily understandable nature — are making for fresh conversations outside of the IT department according to LifeSize Communications.
Lifesize launches all-in-one Unity series
First models in series aiming to remove complexity from HD videoconferencing space.
Atlas Gentech signs LifeSize video comms deal
LifeSize HD video communications solutions to be distributed through New Zealand.
Whitepaper: How MSPs can escape technology's all-too-familiar Catch-22
Managed service providers may be hurting themselves by relying on technology platforms that are ‘good enough'.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?