Quantcast
Channel: 888VoIP - Leading Distributor of VoIP Phone Systems and Solutions » Sangoma Tutorials
Browsing all 8 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Sangoma Whitepaper: Reduce Asterisk System Load by 70%

One of the bottlenecks in using Asterisk is the system resource load when using PSTN connections. This has always been pretty much a constant and has limited systems from having large numbers of...

View Article



Image may be NSFW.
Clik here to view.

Installing a Sangoma A101 PRI Card into trixbox Pro

Getting a Sangoma A101 PRI card working in a trixbox Pro system is actually pretty simple and the Sangoma cards are the only interface cards actually certified by trixbox Pro. If you have the card...

View Article

Image may be NSFW.
Clik here to view.

Installing a Sangoma A101D card in 3CX

Trying to get a Sangoma A101D PRI card working with 3CX can seem a little intimidating the first time since there is more to just plugging it in and having it work. The “secret sauce” is Sangoma’s...

View Article

Installing a Sangoma A200 card in 3CX

Sangoma cards are known for their high quality and great echo cancellation modules so it makes sense to want to use them with 3CX, but the process can be a little confusing the first time. The reason...

View Article

Image may be NSFW.
Clik here to view.

Join us for SBCs Explained: What and Why with Sangoma [Webinar]

Date: March 24th Time: 2:00 PM – 2:30 PM EDT / 11:00 AM – 11:30 AM PDT Register now! In this webinar we will examine what exactly a Session Border Controller is, and why SBCs are essential to the...

View Article


Image may be NSFW.
Clik here to view.

Sangoma offers online training to Resellers and Service Providers

Sangoma, a leading provider of hardware and software components that enable or enahnce IP Communications Systems for voice, data, and video applications, is hosting several trainings for Resellers,...

View Article

Image may be NSFW.
Clik here to view.

Why Firewalls Are Not Enough

Firewalls and Unified Threat Management (UTM) are ubiquitous in today’s networks as they offer comprehensive protection against blended threats. However, these devices offer little coverage in VoIP...

View Article

Image may be NSFW.
Clik here to view.

End of Geography

With respect to traditional TDM technology, security issues such as toll fraud, intrusion of services and eavesdropping are about point of presence. To listen in on someone’s telephone line, the...

View Article

Browsing all 8 articles
Browse latest View live




Latest Images