Managing Your Instant Messaging
by David Strom
Published April 2006; Posted August 2006
As security and policy become more crucial issues, enterprises must be more sophisticated in managing IM and peer-to-peer traffic.
Instant messaging has become the next communications battleground for enterprise IT managers. IM use has exploded, well beyond pimply teens talking through the night - corporate IT staffs are actually building applications that take advantage of IMís real-time presence detection features.
As companies become comfortable with telecommuting and home-based workers, they are finding that it is IM, not email, that ties their staffs together and binds distributed project teams. And also, IM is more appropriate than an overwhelmed email inbox as a way to replace phone tag.
About the author:
David Strom is a freelance writer and author of two computer books and can be reached at email@example.com. He uses multiple IM networks, including AIM, Skype, and others.
This article is reproduced by special arrangement with our partner, Business Communications Review.
Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information. Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site. Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.