skip to Main Content
Senior Living Technology: What Does An Assisted Living Facility Need?

Senior Living Technology: What Does an Assisted Living Facility Need?

As technology ingrains itself further and further into all aspects of the healthcare industry, senior living facilities stand to benefit immensely from technology specifically targeted for them. Spurred by a combination of market forces and some legislation, the breadth of technologies designed for senior living has increased at an astounding rate. With so much choice on the market, what senior living technology do facilities actually need? Here we explore some of the technologies that will benefit senior living facilities the most. Fall Prevention and Detection Senior falls account for nearly 800,000 hospital visits each year, and are a $30 billion healthcare expense. They are a leading cause of traumatic brain injury in the elderly, and are a legitimate health concern…

Continue Reading
What Is A Hosted PBX System And How Does It Work?

What is a Hosted PBX System and How Does it Work?

A private branch exchange, or PBX, is a telephonic switching system that serves private organizations. PBX’s allow for multiple stations to communicate with one another within an organization, as well as route calls into the system to the appropriate party. PBX’s were once the domain of larger organizations because they were too cost prohibitive for smaller organizations to install. With a Hosted PBX system, a PBX system that is hosted over the internet, these cost prohibitions no longer exist, thus allowing companies to implement PBX systems at a far lower cost. Simply put, a hosted PBX system is everything a business needs for their communications needs at a fraction of the cost. History of the hosted PBX system In the…

Continue Reading
How Does A Toll Free Number Work? (Infographic)

How Does A Toll Free Number Work? (Infographic)

Toll free numbers have had a long history. From the days of the Zenith number, introduced in the 1930’s, through to today, the history toll free is full of twists and turns. The regulations that established how toll free numbers work today were passed in the Telecom Act of 1996, and the overall process of how they are routed has not changed much since. So, how exactly does a toll free number work? History of Toll Free The concept of allowing consumers to connect with businesses and government agencies for free began early on in telecom’s history. The Zenith Number, introduced in the 1930’s, allowed callers to connect with businesses free of charge by asking the switch board operator to connect…

Continue Reading
The New Future Of The Desktop Phone: Situational Player!

The New Future of the Desktop Phone: Situational Player!

The future of the desktop phone In professional sports, you often hear the term Situational Player. This usually means that a player has demonstrated exceptional performance in a narrowly defined set of circumstances, but doesn’t have the skills to be a “full-time” player. In football, it might be that guy who is put into the game as a running back for third and short yardage situations. In baseball, you might see a player inserted into the game “for defensive purposes” late in a game when his team is defending a slim lead. You may also see older baseball players who have lost a step to be used situationally, because they have great success in the past against a specific pitcher,…

Continue Reading
Concerns Raised Over Alleged FCC DDOS Attack

Concerns Raised Over Alleged FCC DDOS Attack

According to a May 8 press release, Commissioner Ajit Pai claimed the FCC had fallen victim to a massive DDOS attack during the commenting period for his proposed rollback of Net Neutrality rules. The release directly addressed an outage on the FCC’s website that prevented would-be commenters from posting their thoughts on the issue. If true, and a DDOS attack was indeed carried out on the FCC, this would constitute a major disruption in the agency’s rule making proceedings. Lawmakers, including Senator Ron Wyden (D-Ore.) and Senator Brian Schatz (D-Hawaii), are now probing for answers about the FCC DDOS attack. In an open letter published on May 9, senators Brian Schatz (D-Hawaii), Al Franken (D-Minn.), Patrick Leahy (D-Vt.), Ed Markey (D-Mass.)…

Continue Reading
Net Neutrality: FCC Inundated With 1.2 Million Comments

Net Neutrality: FCC Inundated With 1.2 Million Comments

FCC Inundated With 1.2 Million Comments on Net Neutrality Chairman Ajit Pai has made it clear that he wants to undo Net Neutrality regulations passed by his predecessor, Chairman Tom Wheeler. In his first few weeks as chairman, Chairman Pai unravelled the so-called midnight regulations passed at the last minute by the Obama administration, and ended an investigation by the FCC into zero-rating streaming services. These were the first steps by Chairman Pai to pave the way for dismantling Net Neutrality rules. His efforts have not gone unnoticed. Two weeks ago, the FCC submitted its proposal for a rollback of Obama-era open internet regulations. Per the FCC’s rules, the proposal was published for public inspection and opened for public comment.…

Continue Reading
FCC Adopts Easement Of Rules For Business Data Services

FCC Adopts Easement of Rules for Business Data Services

On April 20, 2017, the FCC adopted an order to eliminate ex ante regulation of packet-based business data services (BDS), and time division multiplex (TDM) services in counties that have been found “competitive,” following a transition period. These services are essential broadband services offered to small businesses across the country in more rural areas where competition tends to be lower, and the ex ante regulations were meant to keep pricing for these services affordable. Under the new order, incumbent local exchange carriers (ILECs) will have more flexibility in how they price their services. The FCC has argued that the regulations on ILEC pricing for BDS services is no longer needed because of competition from ethernet-based providers. What are Business Data…

Continue Reading
What Is A DDOS Attack? 3 Facts You Need To Know

What Is a DDOS Attack? 3 Facts You Need to Know

A DDOS attack, or Distributed Denial-of-Service attack, is a specific kind of malicious act whereby a perpetrator purposefully seeks to disrupt the services of a company to its users by overwhelming their network with frivolous requests. These attacks occur for a variety of reasons - some for revenge on a previous employer, some for no good reason at all other than to be disruptive - and their rise in prevalence across the internet has cause problems for a variety of service providers from small shops to national VoIP carriers. It is important to understand and to prepare for such attacks because the likelihood of becoming a victim is on the rise. What is a DDOS attack? A DDOS attack works by…

Continue Reading
Internet Privacy Rules Rollback: What Does It Change?

Internet Privacy Rules Rollback: What Does it Change?

The FCC's Internet Privacy Rules Undone It was the biggest news in tech and telecom in March: Congress voted to repeal FCC internet privacy rules intended to protect consumer privacy online. Media outlets from Fortune Magazine to the New York Times rushed to put out information on how to set up VPN’s to cater to the unease felt by many internet users over Congress’ actions. Yet, despite the sudden uproar over the change, there is little discussion on what exactly Congress repealed, and why. Considering how new these online privacy rules were—put into effect in October of 2016—it is difficult to imagine that they had become a staple of consumer protection in such a short time. So, what exactly were the rules…

Continue Reading
What Is ‘Hotdesking’ And How Will It Impact Your Business?

What is ‘Hotdesking’ and How Will it Impact Your Business?

The most attractive aspect of a unified communications system is its versatility and flexibility. It allows workers to communicate more efficiently, to spread ideas among one another more easily, and there is tremendous potential in the mobile application of a hosted PBX. This has lead to a new trend in some corporate environments called ‘Hotdesking’. Hotdesking is a specific setup of a Unified Communications (cloud) system that allows the traditional open-floor plan to have an even more open atmosphere by allowing any employee to login to any station at any time. So long, personal desk! Enter the true “shared space”. But is this new open environment good or bad for productivity? The open-space concept was first created by a German…

Continue Reading