Over-the-top' communications services like FaceTime
are a threat to carriers' revenue, but they should respond by competing with these services and not by engaging in discriminatory behavior.
We're excited to add the award-winning creative capabilities of Angelo and his team to the FaceTime
However, just like any other form of electronic communication it must be able to withstand the scrutiny of rigorous regulation," comments Nick Sears, VP EMEA of FaceTime
IM Auditor is the leading IM management solution that enables enterprises to control, manage and log IM activities.
The deal isn't exlusive for either party, and Hsieh said that FaceTime
remains agnostic about which IM system its customers use.
We are very excited to be working with FaceTime
in taking our organization's message to a new level of public awareness," said Kendal Wilkinson, Washington Director of RYM.
0 applications it becomes imperative to secure increasingly complex data streams," said Nishant Jadhav, Director of Product Management of FaceTime
We are looking forward to FaceTime
Strategy's help to spread the word about how land developers and professionals can enhance society and the environment in a cost-effective manner," said Terry Mock, Executive Director of SLDI.
According to a study conducted by NewDiligence Market Research and released today by FaceTime
, users in 74 percent of organizations that have deployed enterprise instant messaging or unified communications applications such as Microsoft Office Communicator 2007 continue to use public IM.
According to the survey "Greynets in the Enterprise: Third Annual Survey of Trends, Attitudes and Impacts," commissioned by FaceTime
and conducted by NewDiligence Research, approximately eight in ten employees will surf, shop and chat over the company network, testimony to the continued blurring of personal and professional workspaces.
During the most recent quarter, FaceTime
researchers identified and reported on numerous incidents.
Security Labs researchers, including Boyd (aka Paperghost), are constantly searching for malware, botnets, spyware and incidents of hacking of social networking sites that can compromise personal as well company data.