Visit our blog page to access free articles on technology.

Network monitoring
June 18, 2015
by Dror Mei-Tal
It’s a normal day at the office   As a Manager who pays staff to do their work, you may get nervous when the office becomes too quiet – yet each of your employees is diligently staring at their computer screens.  Is it because they are incredibly focused or are they on Facebook or some other kind of non-work related...
Best phone system for small business
June 2, 2015
by Dror Mei-Tal
For those in search of a business phone system that best meets their needs, it can be overwhelming when there is so much to choose from.  This blog should help if you are a small to mid-sized business looking for a quality new phone system with reduced line pricing, better calling rates and more features.  In it, I...
Maintenance - Automatic patches and updates, improves PC performance, Helps you work smarter
May 25, 2015
by Dror Mei-Tal
It’s not an easy task to run a business. One of the most important necessities in keeping that business up and running are computers and networks that work at all times. It is probably safe to assume that when the computers are down, so are the users behind them that are also unable to work.  -And that’s when your...
Image of 4 phones
May 15, 2015
by Dror Mei-Tal
Voice over IP services are growing rapidly all over the world. Today, almost every type of voice service contains Internet protocol transmissions used by the individual phone or routed through a mediation device to connect to (outdated) legacy phone systems over analog lines.  Infonetics research “expects continued...
Image of a person hand holding a phone and other technology devices
April 16, 2015
by Dror Mei-Tal
When it’s time to upgrade your phone system, the first thing you need to decide on is whether to buy another legacy (“premise”) box or convert to a cloud-based, “hosted” PBX solution. A legacy phone system is a computer box located at the company’s office and is connected to the individual phones. Companies with...
Image of a phone on top of a laptop keyboard
April 16, 2015
by the GTB Team
Most people are familiar with the term “Computer Hacker”.  In fact, most of us take precautions to protect our computers and online activity by setting up special usernames and passwords.  Some of us even have physical “firewall” devices to protect our computer systems from intruders. What is a "Phone Hacker"? However...
Image of a Law Enforcement Badge
March 2, 2015
by Joel Njoroge
Network security is a broad and complex topic In its bare-bones form, network security consists of policies and provisions that control access and monitor unauthorized access to computer networks. The advent of the Internet and its wide spread embracement has definitely made a remarkable contribution in the way people...
Image of a cow chewing grass
March 23, 2015
by Juan Faidley
No one knew that Maude was addicted to chewing gum. No big deal – except that Maude’s cow-like behavior was taking place while conversing with customers on the company help line. SHE MAY BE TALKING TO YOUR CUSTOMERS (and you don’t even know it). How GTB can help That’s where GTB’s new Call Center Plus can help. Call...
Image of a confused looking baby wearing a headset
March 10, 2015
by Scott Gielda
You may not know when it is out there working for you, but I can guarantee that you will know when it’s not.   Have you ever been on your cell phone and when speaking you hear an echo of yourself?   Or have you heard only part of a person’s conversation because every other syllable was dropped out?   That is poor QOS...

Pages

Subscribe to GTB Blog