Blog & News

Social Media has been with us for quite some time and it just keeps growing with new social platforms and new users joining every day. It is estimated that 3.1 billion people are on social media. Do you know someone between 18 and 40 years old without any social media account (Facebook, Twitter, LinkedIn, etc)? If you don't, then we are on the same page.

Social Media in your Business

Social Media presence is an aspect that every business should have. These days you don't see a lot of people going through the physical yellow page book looking for a company, now we simply search Google if we need to find a restaurant, cleaning or repair service etc. With smartphones now it is easier to find what you are looking for if your service is something people are looking for you want to make sure you have a good presence online.

Having social accounts is not enough. You must keep it current, get followers (friends, or however they are called) and you must engage them to interact with you.

Think to yourself... Are you keeping up with your social media presence? Does it look like you have been out of business for months? Every social media platform Facebook, Twitter, Google, LinkedIn, Instagram, Pinterest etc. has its own capabilities, ways to interact with people and functions.

Read more: What Social Network Should my Business Use?

fusionpbx-cloud-all-working.png

Since release 3.6 of FusionPBX, it is possible to deploy a voice over IP solution on the cloud that satisfies next characteristics:

  • Balancing: Servers split the load among them depending on different network conditions;
  • Cluster: Servers know their peers and they send sync information to each other;
  • High Availability: Servers detect when a pear is down and they split the load among them.

This solution works without Kamailio.

Read more: VoIP Cluster with FusionPBX Servers

VPN, a term that usually is not well understood, means the access of a remote network like if it were local. A VPN is archived using a tunnelling technique which consists of passing one protocol within another. There are several ways to do a tunnel:

  • IP over IP like the old good times,
  • Through another protocol such as GRE like PPTP does,
  • Using a Layer-4 protocol such as TCP or UDP like OpenVPN does,
  • Passing within a Layer-5 protocol such as DNS like Iodine does, or
  • Using a Layer 7 protocol like HTTP.

Security is an add-on that has been per defacto in the VPN's implementations but that doesn't mean it is part of the concept.

In this article, we are going to talk about the OpenVPN and Iodine (DNS) approaches.

Read more: VPN and DNS Tunneling to Protect the Internet Freedom

About OKay

An IT Company whose mission is generating value with low cost of ownership.

We will offer you Linux based solutions that satisfy your needs. We focus on VoIP & Linux, but we are up for any other challenge you may want to bring.