Blog Resources
Absolutely free
[breadcrumb]
All
Business Managers
Technical Managers
ShoreTel ECC MySQL rants, raves and solutions for email, chat and text (SMS) messaging!
If you have worked with ECC custom integrations for any length of time, you have build a library of solutions [...]
Editing ShoreTel System Prompts or WTF is a PHR file?
"Welcome to the ShoreTel Conferencing" sounds like a commercial announcement and many system owners want it changed! After all they [...]
ShoreTel VPN or MPLS? What works and saves money?
An IPsec Virtual Private Network or VPN, is sometimes used as a backup route for a Wide Area Network failure.  [...]
Is there a RAT Virus in your phone system?
If you have a device on your network that you do not have root privileges for, then your entire enterprise [...]
Don't Look now you've been hacked - part 2 (useful tools for awareness)!
Big Brother is Watching! The thought of people being concerned that NSA is listing and monitoring their activities is a [...]
Looking for a UCCX Wall Board? - VSR2 has the vision!
If you have ever considered adding a Wallboard to your CISCO UCCX based Contact Center deployment, you know that the [...]
Don't look now but you have been hacked!
Hackers at the Front Door? Most every home and business office now has a firewall that separates your internal computer [...]
ShoreTel Virtual Trunk Switch - Configuration and License impact!
ShoreTel currently has three virtual appliances that can be used in place of the Orange ShoreGear voice gateways and conference [...]
Hacking ShoreTel with Wireshark or Trouble Shooting One way Audio.
My First Hack? When I was a little kid, back when there was black and white TV sets and 33 [...]
Can you create a "killer" Contact Center Script?
Most Scripting engineers working with Contact Center deployments built on CISCO UCCX, ShoreTel ECC, or Avaya have amassed a collection [...]
Run ShoreTel on Vmware Player or Oracle VirtualBox!
With the release of ShoreTel Version 4.2 the company introduced the concept of virtual appliances. These software objects, had the [...]
SIP as a Disaster Recovery Strategy? EtherSpeak answers the call!
As a standard deployment practice, we at DrVoIP implement SIP trunks as a “fail over” on every system we install. [...]
1 11 12 13 14 15 38