Managing Your Instant Messaging Frontier
by David Strom
Published April 2006; Posted August 2006


Abstract:


 

As security and policy become more crucial issues, enterprises must be more sophisticated in managing IM and peer-to-peer traffic.

 

Instant messaging has become the next communications battleground for enterprise IT managers. IM use has exploded, well beyond pimply teens talking through the night - corporate IT staffs are actually building applications that take advantage of IM’s real-time presence detection features.

 

As companies become comfortable with telecommuting and home-based workers, they are finding that it is IM, not email, that ties their staffs together and binds distributed project teams. And also, IM is more appropriate than an overwhelmed email inbox as a way to replace phone tag.

 

bullet

Access paper
bullet

Approx. 141 kB

bullet

For help with .pdf file downloads, please check out the help topic.

bullet

Return to Managing Corporate Networks Webtorials menu

bullet

Return to Business Communications Review Gold Sponsor Archives

 

About the author:

David Strom is a freelance writer and author of two computer books and can be reached at david@strom.com. He uses multiple IM networks, including AIM, Skype, and others.

 

This article is reproduced by special arrangement with our partner, Business Communications Review.

 

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.