Complete the whole course of free VoIP online training to receive free certification.
What are Queues, and how to implement them in CompletePBX 5, virtual software PBX, free training video.
Download and install free virtual PBX software and start the training here – virtual PBX training.
A certificate that includes your name & the name of your company is issued upon completion.
Complete online VoIP certification for free.
Xorcom virtual IP PBX for hotels, enterprise, schools, call centers, free for download. Asterisk-based IP PBX appliances and hardware, phone systems for call centers.
IP-PBX: recent news & updates:
Evite el Riesgo – El CompletePBX es su Mejor Defensa Contra Ataques Cibernéticos
Ataque Cibernético — usuarios maliciosos que logran un acceso no autorizado a sistemas basados en Internet — no es un fenómeno nuevo. Sin embargo, se está incrementando a un ritmo tan rápido, sobre todo en el mundo de la Telefonía en Internet (VoIP y troncalización...
¡Elegir el PBX-IP incorrecto puede costarle $$$$$ en fraude telefónico… desde el primer día!
. Sepa Cómo Evitar el Riesgo de un Ataque Cibernético Un número creciente de empresas está aprendiendo a valorar las ventajas de las comunicaciones VoIP: reducción considerable de gastos en llamadas de larga distancia, comunicaciones unificadas, el uso óptimo de los...
Branching into 21st Century Telephony | Talk Business Magazine
Contemporary telephone systems play a far more crucial and creative role in businesses than previously thanks to advances in technology and the impact of t Source: Branching into 21st Century Telephony | Talk Business Magazine
Choosing the Wrong IP-PBX Can Cost You $$$$$ in Toll Fraud
. Learn How to Avoid the Risk of Cyber-Attack Increasing numbers of enterprises are learning to appreciate the advantages of VoIP communications: greatly reduced long distance charges, unified communications, optimal use of network resources…the list goes on and on....
Avoid the Risk – CompletePBX is Your Best Defense Against Cyber-Attacks
Cyber-attack -- malicious users gaining unauthorized access to Internet-based systems -- is not a new phenomenon. However, the rate that it is spreading, especially to the world of Internet Telephony (VoIP and SIP trunking), cannot be ignored. Check out this recent...