ShoreTel fail over options using VMware – Part 2 the "Poor Man" Option!
A simple yet very effective step you can take to assure a high availability is all but free! It occurs [...]
WebRTC "peer to peer" Call Center Demo!
What is a “peer to peer” call center? The concept is a fully functioning call center that exists only in [...]
A ShoreTel Communicator for the Mac?
We recently had an opportunity to work with a ShoreTel client that was exclusively using Apple Mac's throughout their enterprise. [...]
Find the password from behind the ********** and other security vulnerabilities!
If you are paying even the slightest attention to current technology trends, you will notice that many of your desktop [...]
Can I text your Enterprise Contact Center?
Phone only 'call centers' have been rapidly replaced with 'contact centers' that can also handle email and chat communications. Customers [...]
ShoreTel iPBX phone system Training!
Phone Training is a double edged sword. Everyone wants it but nobody really wants to make the time commitment required [...]
ShoreTel fail over options using Vmware - Part 1 Building a VMware Test Lab!
The most often asked question we hear among ShoreTel system administrators is how best to achieve "fail over", assure high [...]
AWS S3 - a ShoreTel backup strategy!
Amazon Web Services (AWS) has a range of storage options that make them our first choice in cloud based storage [...]
ShoreTel ECC MySQL rants, raves and solutions for email, chat and text (SMS) messaging!
If you have worked with ECC custom integrations for any length of time, you have build a library of solutions [...]
Editing ShoreTel System Prompts or WTF is a PHR file?
"Welcome to the ShoreTel Conferencing" sounds like a commercial announcement and many system owners want it changed! After all they [...]
ShoreTel VPN or MPLS? What works and saves money?
An IPsec Virtual Private Network or VPN, is sometimes used as a backup route for a Wide Area Network failure. [...]
Is there a RAT Virus in your phone system?
If you have a device on your network that you do not have root privileges for, then your entire enterprise [...]