Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Haber Does Phones!

Haber Does Phones!

You probably didn’t realize that we install and support phone systems.  For many years we avoided phones, due to their proprietary nature, but the landscape has changed dramatically.

Here is a little primer for you on this subject:

Some terminology:

  • VOIP:  Voice Over IP.  This sends your voice data over an internet connection
  • SIP:  Session Initiation Protocol.  This is the industry standard way of phones to communicate
  • PSTN:  Public Switched Telephone Network.  This is our current digital telephone network.  This includes POTS and PRI curcuits
    • POTS:  Plain Old Telephone Service.  Analog phones
    • PRI:  Private Rate Interface.  This is a digital phone line that runs over an "old school" T1.  It can support up to 24 channels

As of 2018, the US incumbent carriers will no longer be required to support this network.  They probably will because they are still making money at it.  Some people have been afraid of the reliability of VOIP.  A PRI is very reliable, but also expensive.  This is changing.  There are things like Managed SIP that provide a very high level of functionality and redundancy at a more modest cost.

Type of phone systems

  • On Premise:  This is the phone system that lives in your office.
  • Virtual:  You can run your phone system on your existing server in your office
  • Hosted:  This is a phone system, where only the phones are with you.  The system itself is being hosted “in the cloud”
  • Hybrid:  This is where you have an on premise phone system and you have a cloud system available for redundancy.  It can also work the other way.

On-prem is best where there are legacy phone lines (POTS or PRI) that you want to continue to use or use as a failover.  Our systems allow you to combine on-prem, virtual, hosted, etc as you need without any boundaries.  This is the direction that Haber Group has gone.

So how does Haber Group work today?

We started on a hosted system about 8 years ago (as I said, I really don’t like traditional phone systems).  Over the last year, we chose Zultys as both our phone system vendor and the premium vendor for our clients.   We chose nexVortex as our SIP trunk provider.

Just like you we have a mobile workforce.  Our Zultys system is hosted.  We have nothing on-prem.  We have phones in the office.  A number of us also have phones at our home offices.  We also have the Zultys app on our smartphones.  We can be reached at our extension no matter where we are.

We can manage our calls via an app on our computers called MXIE.  Our faxes even come into our phone system (for those of you who insist on fax!).  In addition to a standard Auto-Attendant, we also have an integrated call center (ICC) for our technical support queue.

Ultimately it’s about more functionality, more flexibility at less cost.  Phones themselves are coming down in price due to them becoming a commodity product.  The same can be said about hosted phone systems.  The thing to be aware of is that the entry point for a company to become a “cloud phone vendor” is relatively low.  This is good because it encourages competition, but you need to make sure of the reliability of your vendor.  At Haber Group, we have chosen our partners wisely and so should you.

If you would like some more information on this or like to talk to us about it, please CALL ME:  212-609-8500 extension 104


Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Tech Term Microsoft Software Productivity Google Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Windows 10 Hardware Ransomware Backup Smartphone Data Android IT Support Productivity Saving Money Workplace Tips Managed IT Services Data Management Browser Microsoft Office Data Recovery Gmail Windows Managed IT Services Facebook Server Business Continuity Cloud Computing Upgrade Internet of Things Word App Passwords Innovation Office 365 Data Backup Phishing Disaster Recovery Managed Service Provider Business Management VoIP Employer-Employee Relationship Artificial Intelligence Encryption Remote Monitoring Outsourced IT Mobile Device Windows 10 Users Smartphones Cybersecurity IT Support Government Applications Information Money BYOD Office Tips Infrastructure Network Chrome Content Filtering Spam Big Data Miscellaneous Website communications Tip of the week Vulnerability Analytics Social Media Router Display Firewall Robot Customer Service Printing Automation WiFi Avoiding Downtime Hacker Settings Two-factor Authentication IT Management The Internet of Things Maintenance Virtual Reality Bandwidth Save Money YouTube Paperless Office Apple Tablet Employee-Employer Relationship Risk Management Wireless Data storage Access Control Antivirus Managed Service Mobile Device Management Unified Threat Management Apps Administration Holiday VPN Customer Relationship Management Hacking Wi-Fi Data Security Outlook Laptop Data loss Business Technology Development Monitors Virtual Private Network Augmented Reality Mobile Security Safety Presentation Operating System Server Management Document Management Touchscreen End of Support Office Computing Downtime Password Wireless Technology Google Drive Hosted Solution Telephone Systems Gadgets Virtualization Mouse Vendor Management Recovery Quick Tips Business Intelligence Scam LiFi SaaS Search Education Computers Company Culture Storage IBM Retail Networking HIPAA Running Cable Distributed Denial of Service WannaCry Update Legal IT service Alerts Heating/Cooling Service Level Agreement MSP Comparison Hard Disk Drive PowerPoint Refrigeration Drones Virtual Desktop Fraud Time Management Internet Exlporer Managing Stress Managed Services User Alt Codes Dark Data Going Green Social Engineering Buisness Title II Firefox Connectivity eWaste Device Public Speaking SharePoint Cabling Digital Payment Lithium-ion battery Managed IT Service Modem Chromebook LED Competition IT solutions BDR Licensing Servers Politics Social Specifications Compliance Onboarding Collaboration Network Management Value Cables Laptops Typing 5G Online IoT Techology Continuity Mobility Deep Learning Humor Downloads IT Technicians Managed IT Slack Halloween Break Fix Digital Cookies Lenovo Smart Office Co-Managed IT Cortana Google Maps Cooperation Charging Tech Support Hacks Black Friday Regulations Mail Merge Digital Signage File Sharing Undo Budget Fun Hotspot Professional Services Wires Software as a Service Computer Care Cryptocurrency Marketing How To Microsoft Excel Star Wars Unified Threat Management Solar Samsung Print Toner Bring Your Own Device sip Multi-Factor Security Disaster Mirgation Shortcut Monitoring Scary Stories Dark Web Spyware Nanotechnology Superfish Work Content Staff Statistics Websites Identity Theft Application Cybercrime Cyber Monday Social Networking Address Desktop Language USB Voice over Internet Protocol Training Bitcoin Network Congestion IP Address Spying Automobile Information Technology Blockchain Cost Management User Error Shortcuts G Suite Best Practice telephony Google Calendar Uninterrupted Power Supply Chatbots Patch Management Writing Sports Net Neutrality Screen Reader Optimization Streaming Google Docs Knowledge Printer Wearable Technology Bluetooth Analysis Mobile Office Smart Technology Corporate Profile Motherboard Troubleshooting Computing Infrastructure Dongle FinTech Windows 8 Hard Drives Google Wallet Permissions VoIP Assessment Security Cameras Business Growth Legislation Solid State Drive Identity Current Events FCC How To Smart Tech Recycling Remote Computing Human Error Experience Unified Communications Emergency Printers GPS Computer Repair 3D Printing IT Consultant Processors Cameras Relocation Meetings Tracking Health Unsupported Software Cleaning Alert CCTV Private Cloud Emoji Webcam Electronic Medical Records Mobile Data Work/Life Balance Error Black Market Point of Sale Regulation Travel Law Enforcement Entertainment Notifications Mobile Computing CrashOverride Twitter Botnet Supercomputer Motion Sickness Physical Security Gadget Staffing Personal Information Administrator Upgrades Crowdsourcing Taxes Web Server Domains Machine Learning IT Budget