Boston’s Premier Business Phone Provider

Call Now: 617-788-2420

TELRush Client Portal

Making the Business Case for Remote Workers with VoIP

A white paper from Ziff Davis.

This guide is the first in a two-part series examining the opportunity presented to businesses by remote working. Our analysis here is focused on defining and framing the opportunity. There is a plethora of trends driving the need for remote working, both specific to the workplace and more broadly to society at large. Once these have been considered, businesses must look at the associated benefits in terms of their impact on the organization as well as the performance of employees.


Building a Network for the 21st Century

Posted by: Bob Quinn on November 7, 2012 at 12:03 pm

This morning, we announced a very significant capital commitment to our broadband infrastructure. The net-net is that we are committing $14 Billion in capital to bring Internet broadband infrastructure – wireline and wireless – to more places over the next three years. As part of that commitment, we plan to expand our 4G LTE network by an additional 50 million consumers (based on population covered). And we plan to provide an additional 8.5 million customer locations with our award winning U-verse product that will directly compete with the cable incumbent's voice, video and broadband offerings. As a result of these investments, millions of customer locations that have at best access only to legacy DSL services will have access to either U-verse or IP DSLAM technology.


When it comes to VoIP and unified communications, are you sacrificing security for cost savings?

By Dave Martin, vice president of marketing, Edgewater Networks, special to Network World
January 04, 2013 04:23 PM ET

If you were to ask most IT professionals to connect CRM or ERP applications to an external IP network without some form of network security, they would look at you as if you had lost your mind. Even the most basic cloud-based business applications integrate security to help ensure the integrity of data and continuity of the service. Yet many organizations today are deploying business critical IP-based voice and video communications without applying standard corporate security policies.