The IDeACOM Blog

Follow us on the road to simplifying technology...

Where Has the Time Gone?

A blast from the past! Yea, that’s a collection of old cell phones including my first “smartphone” – the Palm Treo 650 (circa 2004). You'll also notice some old Executone admin & user guides, along with a couple editions of Newton’s Telecom Dictionary from the...

We Value Your Feedback!

We are focused keeping you informed about VoIP technology! Specifically, how it can help your company collaborate more efficiently and communicate more cost-effectively with staff and clients. Last month we invited you to tap into our expertise by requesting a VoIP...

Solving the Issue of Packet Loss

If your business is relying on a hosted PBX service to handle its phone and Unified Communications systems, it is imperative to have a solid support network. Since Voice Over IP (VoIP) relies on your internet connection to make calls, the quality of your calls can be...

The New Distributed Workforce

With remote teams of employees becoming much more commonplace, employers are tasked with effectively managing their distributed workforce. Many technologies exist to enable and control resources available to remote employees. Voice-over-Internet-Protocol, or VoIP,...

Leadership and Self-Deception

I feel compelled to share a book that I recently received from one of my vendor-partners – thank you Zultys! It’s titled “Leadership and Self-Deception”, and I highly recommend it! It’s a story about a how a company propelled itself well beyond its competitors by...

How to Select the Right Voice and Data Vendor

Regardless of your type of business, your ability to communicate with employees, customers, clients, vendors and others is critical to your success. This makes choosing the right voice and data vendor one of your most important business decisions. There are countless...

Handling the Threat of Ransomware

"Ransomware" is the term used when hackers make the data on your network inaccessible to you until you pay a large ransom. The tools used for ransomware are no different than those used for traditional hacking but, instead of stealing data, criminals want to steal...

Something for Everyone…

I recently returned from the 2018 annual IDeACOM conference. This was a great meeting that provided a lot of value for all in attendance, including 46 vendor-partners who demonstrated their products and services. And I'm happy to say that I had an opportunity to talk...

But Wait!, There’s More…

An often-overlooked component of a company’s marketing initiative could be as simple as how you’re treating your callers when they’re ‘on hold’. I’m not talking about subjecting them to a “But Wait!, there’s more…” in your face infomercial.   Sometimes it can be...

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Pin It on Pinterest

Share This