A Brief History of Chat Services from Way Back in 1973, to the Present Day Brought to You by Sameroom.Io

Total Page:16

File Type:pdf, Size:1020Kb

A Brief History of Chat Services from Way Back in 1973, to the Present Day Brought to You by Sameroom.Io A Brief History of Chat Services From way back in 1973, to the present day Brought to you by Sameroom.io 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 Talkomatic Protocol: Own TERM-talk Protocol: Own 1973 Unix Talk Protocol: Talk 1983 Talker Protocol: Telnet 1984 BITNET Relay Protocol: Own 1985 IRC Protocol: IRC 1988 ICB Protocol: Own 1989 EFNet Protocol: IRC Ytalk Protocol: Talk + 1990 UnderNet Protocol: IRC 1992 DALnet Protocol: IRC PowWow Protocol: IRC 1994 Freenode Protocol: IRC 1995 ICQ Protocol: Own Sold to AOL (Converts to Oscar) Sold to mail.ru Hotline Protocol: Own IRCnet Protocol: IRC 1996 AIM Protocol: Oscar 52% US use AIM Usage decline Microsoft Netmeeting Protocol: MSNP 1997 IBM Sametime Based on Databeam and Ubique QuakeNet Protocol: IRC Yahoo! Messenger Protocol: YMSG Interoperable with MSN End MSN interop 1998 Jabber Protocol: XMPP Cisco buys Jabber XCP MSN Messenger Protocol: MSNP Odigo Protocol: Own QQ (by Tencent) Protocol: Own 1999 Windows Messenger Protocol: MSNP 2001 Rizon Protocol: IRC 2002 Skype Protocol: Own Sold to eBay Sold to Microsoft Protocol: MSNP 2003 Mail.ru Protocol: ICQ/Oscar 2004 Google Talk Protocol: XMPP 2005 Blackberry Messenger Protocol: Own Campfire Protocol: Own 37signals rebrands, signups close Signups reopen 2006 GroupSwim Proto: Own MS Office Communicator Proto: MSNP 2007 Я.Онлайн Protocol: XMPP Unison Protocol: Own Acquired by Skype by Acquired 2008 Salesforce acquires GroupSwim, renames it Chatter WhatsApp Protocol: XMPP w/extensions Sold to Facebook Protocol: Own 2009 Flowdock Protocol: Own Sold to Rally Software Sold to CA GroupMe Protocol: Own HipChat Protocol: XMPP w/extensions Sold to Atlassian KakaoTalk Protocol: Own Microsoft Lync Protocol: MSNP Signal Protocol: Own Viber Protocol: Own 2010 Facebook Messenger Protocol: Own Hall Protocol: Own Sold to Atlassian iMessage Protocol: Own Line Protocol: Own Lua Protocol: Own MoMo Protocol: Own WeChat (by Tencent) Protocol: Own 2011 Chatwork Protocol: Own Quip Shifts to team chat Protocol: Own Wire Protocol: Own Zulip (Closed β) Protocol: Own Sold to Dropbox Relaunched as open-source 2012 Cotap Protocol: Own Renamed: Zinc Fleep Protocol: Own Glip Protocol: Own Sold to RingCentral Google+ Hangouts Protocol: Own Google Hangouts Chat Intellinote Protocol: Own Acquired by Broadsoft Kato Protocol: Own Laiwang by Alibaba Protocol: Own Moxtra Protocol: Own Pie Protocol: Own Slack Protocol: Own Talk.co (branchout pivot) Telegram Protocol: MTProto TigerText Protocol: Own Yixin (by China Telecom) Protocol: Own 2013 Chapp Protocol: Own ChatGrape Protocol: Own Circuit by Unify Protocol: Own Cisco Spark Protocol: Own Evernote Work Chat Protocol: Own FireChat Protocol: Own Flock Protocol: Own Gitter Protocol: FAYE Jandi Protocol: Own Mez Protocol: Own Talko Protocol: Own Teamchat Protocol: Own Tribecube Protocol: Own Vector.im Protocol: Matrix Renamed: Riot.im 2014 Discord Protocol: Own Facebook at Work Protocol: Own Jive Chime Protocol: Own Mattermost Protocol: Own Rocket.chat Protocol: Own Ryver Protocol: XMPP Skype for Business Protocol: MSNP Symphony Protocol: Own Clearchat Protocol: Own 2015 2016 2017.
Recommended publications
  • Bebras International Workshop 2020 Delegates’ Guidelines for Working Groups
    Bebras International Workshop 2020 Delegates’ Guidelines for Working Groups Preparation for Working Group Participation Please read through this document thoroughly in order to make your work for the Bebras Workshop more efficient. Prepare Your Workplace You will need to have the following installed and running: ● A recent computer. ​ ​ ● A working microphone. ​ ​ ● If possible a webcam. ​ ​ ● A proper up-to-date web browser (for this year Chrome or Chromium derivatives like Vivaldi are ​ ​ preferred for compatibility reasons). ● A SVN client (except for guests or representatives without SVN access1). ​ ​ ○ Windows: TortoiseSVN is recommended (https://tortoisesvn.net/). ​ ​ ○ macOS: either use the command line (if you’re comfortable with it) or consider Versions https://versionsapp.com/ (not free); some people have also used integrated development ​ environments that offer SVN functionality; some people even run a virtualized Windows just for TortoiseSVN. ○ Linux: you know what you’re doing, right? ● LibreOffice 6.3 or 6.4 (https://www.libreoffice.org/download/download/). Older versions become ​ ​ ​ increasingly incompatible. OpenOffice is no longer an alternative. ● A proper text editor (not Word or LibreOffice but for HTML source code editing) ​ ​ ○ Windows: Notepad++ is recommended (https://notepad-plus-plus.org/downloads/). ​ ​ ○ macOS: TextWrangler 5.5.2 was recommended for pre-macOS 10.15, Atom is also working with macOS 10.15 (https://atom.io/). ​ ​ ○ Linux: you know what you’re doing, right? ● Our video conferencing tool for the working groups (a local installation of Jitsi Meet available at ​ ​ https://workshop.cuttle.org/BebrasYourRoomName ) will run fine in any web browser. There is an ​ ​ electron app available (https://github.com/jitsi/jitsi-meet-electron/releases), but watch out for ​ ​ security problems with electron apps because they tend to bundle older chromium versions with security problems.
    [Show full text]
  • Desynched Channels on Ircnet
    Desynched channels on IRCnet Michael Hansen and Jeroen F. J. Laros [email protected] October 29, 2018 Abstract In this paper we describe what a desynchronised channel on IRC is. We give procedures on how to create such a channel and how to remove desyn- chronisation. We explain which types of desynchronisation there are, what properties desynchronised channels have, and which properties can be ex- ploited. 1 Introduction IRC [1] is one of the oldest digital communication protocols on the internet [2]. This protocol is a form of synchronous conferencing which is mainly used for its one-to-many communication capabilities. Although its popularity has somewhat diminished since the introduction of instant messaging applications [3] like the MSN messenger [4], it is still widely used. In this paper, we first give some background information about IRC in Sec- tion 2. In Section 3 we elaborate on the phenomenon of desynched channels and in Section 4 we describe how to place a boundary, Section 5 covers the occurrence of fake modes and Section 6 describes how to remove a desync. In Section 7, we give some examples of possible uses of fake modes and we conclude in Section 8. arXiv:0811.3140v1 [cs.NI] 19 Nov 2008 2 Background An IRC network consists of multiple servers connected to each other, there are no cycles in this network, so the topology of this network is an undirected tree (acyclic graph). An IRC network also has clients connected to its servers, and messages are relayed from server to server to transfer a message from one client to another.
    [Show full text]
  • Deliverable D8.4 Final Report on Sustainability and Exploitation
    07-07-2020 Deliverable D8.4 Final Report on Sustainability and Exploitation Deliverable D8.4 Contractual Date: 31-05-2020 Actual Date: 07-07-2020 Grant Agreement No.: 732049 – Up2U Work Package: WP8 Task Item: Task 8.1. Nature of Deliverable: R (Report) Dissemination Level: PU (Public) Lead Partner: GWDG Authors: Faraz Fatemi Moghaddam (GWDG), Philipp Wieder (GWDG), Aytaj Badirova (GWDG), Erik Kikkenborg (GÉANT), Gyöngyi Horváth (GÉANT), Casper Dreef (GÉANT), Andrea Corleto (GARR), Eleonora Napolitano (GARR), Gabriella Paolini (GARR), Krzysztof Kurowski (PSNC), Raimundas Tuminauskas (PSNC), Michal Zimniewicz (PSNC), Nelson Dias (FCT|FCCN), Antonio Vieira Castro (ISEP), Mary Grammatikou (NTUA), Dimitris Pantazatos (NTUA), Barbara Tóth (KIFÜ), Csilla Gödri (KIFÜ), Gytis Cibulskis (KTU), Jack Barokas (TAU), Ingrid Barth (TAU), Eli Shmueli (IUCC), Nadav Kavalerchik (IUCC), Orit Baruth (IUCC), Domingo Docampo (UVigo), Iván Otero (UVigo), Vicente Goyanes (TELTEK), Xoan Vidal (TELTEK), Stefano Lariccia (UROMA), Marco Montanari (UROMA), Nadia Sansone (UROMA), Giovanni Toffoli (UROMA), Allan Third (OU) © GÉANT Association on behalf of the Up2U project. The innovation action leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No. 732049 – Up2U. Table of Contents Executive Summary 1 1 Introduction 2 2 Business Models – Exploitation Activities 3 2.1 Up2U Tools for NRENs and Schools 4 2.1.1 The Centralised Model 5 2.1.2 openUp2U 5 2.1.3 The National Model 6 2.2
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • STEM Subjects Face the Haptic Generation: the Ischolar Tesis
    STEM Subjects Face the Haptic Generation: The iScholar Tesis doctoral Nuria Llobregat Gómez Director Dr. D. Luis Manuel Sánchez Ruiz Valencia, noviembre 2019 A mi Madre, a mi Padre (†), a mis Yayos (†), y a mi Hija, sin cuya existencia esto no hubiese podido suceder. Contents Abstract. English Version Resumen. Spanish Version Resum. Valencian Version Acknowledgements Introduction_____________________________________________________________________ 7 Outsight ____________________________________________________________________________________ 13 Insight ______________________________________________________________________________________14 Statement of the Research Questions __________________________________________________________ 15 Dissertation Structure ________________________________________________________________________16 SECTION A. State of the Art. The Drivers ____________________________________________ 19 Chapter 1: Haptic Device Irruption 1.1 Science or Fiction? Some Historical Facts ______________________________________________ 25 1.2 The Irruptive Perspective ___________________________________________________________ 29 1.2.1 i_Learn & i_Different ____________________________________________________________________ 29 1.2.2 Corporate Discourse and Education ________________________________________________________ 31 1.2.3 Size & Portability Impact _________________________________________________________________ 33 First Devices _____________________________________________________________________________ 33 Pro Models
    [Show full text]
  • Skype Voip Service- Architecture and Comparison Hao Wang Institute of Communication Networks and Computer Engineering University of Stuttgart Mentor: Dr.-Ing
    INFOTECH Seminar Advanced Communication Services (ACS), 2005 Skype VoIP service- architecture and comparison Hao Wang Institute of Communication Networks and Computer Engineering University of Stuttgart Mentor: Dr.-Ing. S. Rupp ABSTRACT Skype is a peer-to-peer (P2P) overlay network for VoIP and other applications, developed by KaZaa in 2003. Skype can traverse NAT and firewall more efficiently than traditional VoIP networks and it offers better voice quality. To find and locate users, Skype uses “supernodes” that are running on peer machines. In contrast, traditional systems use fixed central servers. Also Skype uses encrypted media channel to protect the dada. The main contribution of this article is illustrating the architecture and components of Skype networks and basically analyzing key Skype functions such as login, NAT and firewall traversal. Furthermore, it contains comparisons of Skype networks with VoIP networks regarding different scenarios. On that basis it reveals some reasons why Skype has much better performance than previous VoIP products. Keywords Voice over IP (VoIP), Skype, Peer-to-peer (p2p), Super Node (SN) 1. Introduction It is expected that real-time person-to-person communication, like IP telephony (VoIP), instant messaging, voice, video and data collaboration will be the next big wave of Internet usage. VoIP refers to technology that enables routing of voice conversations over the Internet or any other IP network. Another technology is peer-to-peer, which is used for sharing content like audio, video, data or anything in digital format. Skype is a combination of these two technologies. It has much better performance by making use of advantages of both technologies.
    [Show full text]
  • Devicelock® DLP 8.3 User Manual
    DeviceLock® DLP 8.3 User Manual © 1996-2020 DeviceLock, Inc. All Rights Reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means for any purpose other than the purchaser’s personal use without the prior written permission of DeviceLock, Inc. Trademarks DeviceLock and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. DeviceLock DLP - User Manual Software version: 8.3 Updated: March 2020 Contents About This Manual . .8 Conventions . 8 DeviceLock Overview . .9 General Information . 9 Managed Access Control . 13 DeviceLock Service for Mac . 17 DeviceLock Content Security Server . 18 How Search Server Works . 18 ContentLock and NetworkLock . 20 ContentLock and NetworkLock Licensing . 24 Basic Security Rules . 25 Installing DeviceLock . .26 System Requirements . 26 Deploying DeviceLock Service for Windows . 30 Interactive Installation . 30 Unattended Installation . 35 Installation via Microsoft Systems Management Server . 36 Installation via DeviceLock Management Console . 36 Installation via DeviceLock Enterprise Manager . 37 Installation via Group Policy . 38 Installation via DeviceLock Enterprise Server . 44 Deploying DeviceLock Service for Mac . 45 Interactive Installation . 45 Command Line Utility . 47 Unattended Installation . 48 Installing Management Consoles . 49 Installing DeviceLock Enterprise Server . 52 Installation Steps . 52 Installing and Accessing DeviceLock WebConsole . 65 Prepare for Installation . 65 Install the DeviceLock WebConsole . 66 Access the DeviceLock WebConsole . 67 Installing DeviceLock Content Security Server . 68 Prepare to Install . 68 Start Installation . 70 Perform Configuration and Complete Installation . 71 DeviceLock Consoles and Tools .
    [Show full text]
  • Insight Into the Gtalk Protocol
    1 Insight into the Gtalk Protocol Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science Halifax NS B3H 1W5, Canada (riyad,zincir)@cs.dal.ca Abstract Google talk (Gtalk) is an instant messeger and voice over IP client developed by Google in 2005. Gtalk can work across firewalls and has very good voice quality. It encrypts calls end-to-end, and stores user information in a centralized fashion. This paper analyzes fundamental Gtalk functions such as login, firewall traversal, and call establishment under different network scenarios. The analysis is performed by both active and passive measurement techniques to understand the Gtalk network traffic. Based on our analysis, we devised algorithms for login and call establishment processes as well as data flow models. I. INTRODUCTION Voice over IP (VoIP) is becoming a major communication service for enterprises and individuals since the cost of VoIP calls is low and the voice quality is getting better. To date, there are many VoIP products that are able to provide high call quality such as Skype [1], Google Talk (Gtalk) [2], Microsoft Messenger (MSN) [3], and Yahoo! Messenger (YMSG) [4]. However, few information has been documented about protocol design used by these VoIP clients since the protocols are not standardized, many of them are proprietary, and the creators of these softwares want to keep their information confidential and protect their protocol design form competitors. In this paper, we have generated and captured network traffic in order to determine the broad characteristics of one of the most recent and fast growing VoIP applications, Google Talk.
    [Show full text]
  • Abstract Introduction Methodology
    Kajetan Hinner (2000): Statistics of major IRC networks: methods and summary of user count. M/C: A Journal of Media and Culture 3(4). <originally: http://www.api-network.com/mc/0008/count.html> now: http://www.media-culture.org.au/0008/count.html - Actual figures and updates: www.hinner.com/ircstat/ Abstract The article explains a successful approach to monitor the major worldwide Internet Relay Chat (IRC) networks. It introduces a new research tool capable of producing detailed and accurate statistics of IRC network’s user count. Several obsolete methods are discussed before the still ongoing Socip.perl program is explained. Finally some IRC statistics are described, like development of user figures, their maximum count, IRC channel figures, etc. Introduction Internet Relay Chat (IRC) is a text-based service, where people can meet online and chat. All chat is organized in channels which a specific topic, like #usa or #linux. A user can be taking part in several channels when connected to an IRC network. For a long time the only IRC network has been EFnet (Eris-Free Network, named after its server eris.berkeley.edu), founded in 1990. The other three major IRC networks are Undernet (1993), DALnet (1994) and IRCnet, which split off EFnet in June 1996. All persons connecting to an IRC network at one time create that IRC network’s user space. People are constantly signing on and off, the total number of users ever been to a specific IRC network could be called social space of that IRC network. It is obvious, that the IRC network’s social space by far outnumbers its user space.
    [Show full text]
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Open Source Web Chat Application
    Open Source Web Chat Application Is Wood always contractive and subarcuate when carps some bowel very lithographically and lastly? Frederik is run-of-the-mill and hull decorously while epicritic Neel solarizing and pencil. Prerecorded and muskiest Westley never bulges immutably when Dwane behooving his rubricians. Ui makes podium so that apply moderation, open source chat web application helps you can set up your use mesh does not have access to create your industry use them Mumble them a quality, open cell, low latency, high male voice chat application. Move copyright the chat applications around it opens, public and hubot friendly people. Simon on web application which take this open source? Empathy lets you automatic reconnecting using a network manager. This servlet removes the blanket request. Looking up an app or software developmet company? Mumble by a dark open concept low latency high cold voice chat application Mumble into the first VoIP application to reproduce true low latency voice communication. Firebase support chat applications which means bring people. AJAX Chat Softaculous. For chat application on frequent questions and open source web chat software that offers a live chats depending upon opening up. And chat applications are forced into shareable and all chats. Delta Chat The messenger. By your continued use of local site offer accept all use. Enough can dip your toes in swamp water. But as chat application services and video chats at the source code and past conversations. Do some reasons that fits their screen activity on a friend request is available in a message. Web-based development tools Conversational logs Integrate with common knowledge sources RESTful APIs Pandorabots Pros Open source platform so you.
    [Show full text]
  • (BRENT DENNING) SHAPING the NEW NORMAL.Pdf
    How can technology help the “New Normal” ARE YOU SET UP FOR REMOTE WORKING? Cloud Computing is an Enabler for Remote Working of Chief Technology Officers say cloud computing had the most measurable 74% impact in their businesses in 2017 - (Forbes) WHAT IS DRIVING COMPANIES TO THE CLOUD*? 42% - Desktop Virtualization - Access to data anywhere 38% - Disaster recovery capabilities 37% - Enabling better business flexibility 36% - Reducing support burdon on IT staff * Study by Sysgroup 2019 TECHNOLOGY PILLARS SUPPORTING REMOTE WORKING What Technology Platforms Do You Need to Consider Adopting Visibility to Communications Collaboration & Operating Systems Sharing work Accounting Systems Communications Collaboration (Xero, Quickbooks etc) (ZOOM, Google Hangout, MS (GDrive, MS Teams) teams, Webex, Whatsapp, ERP (SAP, Oracle) Messenger, Viber, Telegram, Shared Drive (Box, Dropbox, CRM (Salesforce, Hubspot, Zoho) Mattermost, Wechat) We Transfer) Payroll Software (Salarium, Square) Payment systems (Paypal, Square) Recruitment/HR (Trello, Workday) WHAT CAN YOU ACHIEVE WITH TECHNOLOGY AND REMOTE WORKING ? PRODUCTIVITY* 13% improvement in Productivity* - When working in a nominated shift RECRUITMENT** 9 out 10 Filipino workers would prefer to work organisations with flexible workplace arrangements. * Stanford University Nicholas Bloom Journals of Economics CTrip - China, 16,000 employees ** IWG Workplace Survey, 2019 IS THERE ANY NEED TO WORRY ABOUT REMOTE WORKING? EMPLOYEES EMPLOYERS ● Productivity ? ● Collaboration ? ● Communication ? ● Reduced visibility/
    [Show full text]