What's in Store for Cloud Telephony in 2013?
CallFire was recently featured in a Yahoo Finance article describing what's in store for the space in 2013. Here's an excerpt from the article:
CallFire was recently featured in a Yahoo Finance article describing what's in store for the space in 2013. Here's an excerpt from the article:
Cloud Telephony Pioneer CallFire Surpasses 50,000 User Milestone, Sets Sights on Reshaping Telecom Space
Company Delivers Customizable Software Solutions,
Strong ROI Across Diverse Client Base
SANTA MONICA, Calif. (July 12, 2012) – Signaling an overall shift away from costly hardware in favor of affordable cloud-based voice and text messaging services for the commercial and non-profit sectors, CallFire (www.callfire.com) today announced that it has surpassed 50,000 users.
Campaigns are here today, gone tomorrow. Resources are short and time is scarce. The relatively short shelf life of a campaign makes investing in expensive software not realistic. Installation of costly equipment for a campaign that usually lasts for six months rarely makes sense and when you have multiple offices it makes even less sense. One of the most glaring examples of this would be buying a dedicated campaign phone line. For one, installation of a phone a system is both costly and is time consuming.
In December of 2011, the US Call Center and Consumer Protection Act was introduced in Congress. The bill would refuse federal grant or loan programs to companies with offshore call center operations. It would also require offshore call center employees to reveal their location to U.S. consumers and give them the option to be transferred to a domestic call center.
By Julie Goldstein At CallFire, cyber security is a major concern and it is a top priority to protect our customer's data. We want to make sure that our clients know how to protect themselves against all sorts of cyber security issues. With identity theft becoming an epidemic on the internet, it is more important than ever to know when you are being directed to a page that is trying to steal (“phish”) your personal information. Identifying a Phishing page is like identifying a copy of a painting.