Article | 14/05/2013 Outlook.com to let users engage in IM chats with Gmail usersMicrosoft is upgrading its new Outlook.com webmail service so that its users can communicate with Gmail users via instant messaging.
Article | 2/05/2013 Citrix adds IM to Podio enterprise collaboration softwareCitrix has added instant messaging to its Podio enterprise collaboration product so that employees can engage in one-to-one and group text chats while...
Article | 10/04/2013 Chat app Line takes on Amazon, e-book retailers with manga serviceLine, the popular messaging platform based in Japan, is challenging e-book vendors like Amazon and Rakuten with a new service to download and view man...
Article | 9/04/2013 Glitch hits Apple's iMessage, FacetimeApple's iMessage and Facetime messaging systems have been hit with a glitch that has taken the services offline for several hours.
Article | 11/12/2010 Who’s using Twitter? Some surprising answersEight percent of online Americans may use Twitter, as the Pew Internet & American Life Project reported on Thursday. But does that mean your small bus...
Article | 6/09/2010 Did e-mail and the Internet kill the 9-5 workday?Have you checked your work e-mailtoday? If you're like most employees in the United States and United Kingdom, the answer is yes despite the fact that...
Article | 19/07/2010 PalTalkScene adds video to its chatPaltalkScene is a full-featured messaging/chat program that includes video, audio, and a host of other bells and whistles, as well as the ability to s...
Article | 12/08/2009 Instant messaging etiquette: Five simple rulesThe popularity of instant messaging has grown exponentially in the past decade, but the communication platform's immediacy presents users with endless...
Whitepapers about instant messaging
This paper will discuss strategies for controlling a broad range of recreational Internet traffic such as instant messaging, P2P file downloads and social networking activities that can significantly slow business applications and impact employee productivity. By implementing a solution to effectively detect, classify and control recreational traffic, including encrypted P2P traffic designed to slip past corporate firewalls, organisations can improve employee productivity, accelerate application response times, reclaim bandwidth for business-critical applications and defer costly bandwidth upgrades. Read this whitepaper.
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »
Sign up to PC World Today for the latest news, reviews and galleries from PC World Australia.Sign up now »
- FTTechnical Business AnalystNSW
- FTTest EngineerVIC
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTOS Web Applications DeveloperNSW
- FTR&D EngineerSA
- FTWeb Analyst - WebTrendsVIC
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTQuality ManagerSA