top of page

24/7 Emergency Service Request Line
1 - 800 - 575 - 8835
Frequently Asked Questions
• Pros: cloud-based collaboration, integrated apps (email, calendar, document sharing, video conferencing), scalable plans, automatic updates, robust security features, wide device compatibility, strong support ecosystem.
• Cons: ongoing subscription costs, some users may need training to maximize features, reliance on stable internet connectivity, data residency and compliance options can vary by plan, potential feature gaps for very niche workflows.
• What to consider next: assess your team size, existing tools, need for offline access, and preferred data residency. Compare plans (e.g., Business vs. Enterprise) and consider a pilot group to gauge fit.
• Desk phones provide reliable, high-quality voice calls, especially in environments with poor Wi-Fi coverage. They support advanced features (call transfer, conferencing, voicemail, call queues), offer consistent performance for the entire team, and can integrate with unified communications systems for centralized management.
• What to check: compatibility with your chosen communications platform, PoE power options, headset compatibility, and scale of the phone system (number of lines/extensions) required for your team.
• Key considerations: compatibility with existing infrastructure, bandwidth and scalability, security features (encryption, threat protection, access controls), total cost of ownership (initial purchase, ongoing maintenance, support), ease of management, and vendor support commitments.
• Evaluation tips: map your current and projected traffic, identify critical applications, decide between on-premises, hosted, or hybrid deployments, and request proof-of-concept testing before a full rollout.
• A disaster recovery plan helps ensure business continuity by defining backup strategies, recovery objectives (RTO/RPO), and response procedures. It reduces downtime, protects critical data, and provides a tested roadmap for restoring operations after an incident.
• What to include: a prioritized list of critical systems, data backup schedules, offsite or cloud replication, tested failover processes, and clear roles/responsibilities for team members.
The main task of a surge protector is to protect electronic devices from “power surges.” A power surge, or transient voltage, is an increase in voltage significantly above the designated level in a flow of electricity. In typical home/office wiring, the standard voltage is 120 volts; if voltage rises above 120, the surge protector helps protect your electronic device.
The most familiar source of power surges is probably lightning, though it's actually one of the least common causes. When lightning strikes near a power line, whether it's underground, in a building or running along poles, the electrical energy can boost electrical pressure by millions of volts. This causes an extremely large power surge that will overpower almost any surge protector. In a lightning storm, you should never rely on your surge protector to save your computer. The best protection is to unplug your computer.
A more common cause of power surges is the operation of high-power electrical devices, such as elevators, air conditioners and refrigerators. These high-powered pieces of equipment require a lot of energy to switch on and turn off components like compressors and motors. This switching creates sudden, brief demands for power, which upset the steady voltage flow in the electrical system. While these surges are nowhere near the intensity of a lightning surge, they can be severe enough to damage components, immediately or gradually, and they occur regularly in most building's electrical systems.
Other sources of power surges include faulty wiring, problems with the utility company's equipment, and downed power lines.
• Factors include coverage (video surveillance, access control, intrusion detection), ease of monitoring from a centralized dashboard, integration with other systems (alarms, IT, HVAC), upfront and ongoing costs, and scalability as the business grows. Consider both physical security and cybersecurity implications, such as secure network segmentation and device hardening.
• Nobel can help by: conducting a risk assessment to identify high-priority areas, recommending appropriate sensor density and coverage, outlining data retention policies for footage, and providing guidance on compliant, scalable security solutions tailored to your environment.
Phone systems need dual protection
Even if you protect your business phone system with an electrical power surge protector, it is also exposed to damaging surges from other sources. Telephone and internet lines can also conduct high voltage, so for full protection you should also guard against surges from your phone and cable lines. Essentially, any lines carrying signals into your phone system can carry a power surge and can cause just as much damage as surges over power lines.
It is possible a technician will need to help you, but first you are welcome to try these... just be sure of which system you have before inputting codes! If you encounter any issues or need assistance in identifying your system, let us know! (mailto:service@nobelvoicedata.com?subject=Issues Changing Time)
NEC SV8100 & SV9100
1. Press Speaker
2. Dial "#*#*"
3. Password: "0000"
4. Press Transfer
5. Dial "100101"
6. Enter 2-digits for the year, than press transfer.
7. Enter 2-digits for the month, than press transfer.
8. Enter 2-digits for the day, than press transfer.
9. Enter 2-digits for the day of the week, than press transfer.
10. Enter 2-digits for the hour, than press transfer.
11. Enter 2-digits for the minute, than press transfer.
12. Enter 2-digits for the second, than press transfer.
13. Press Answer.
14. Press Answer.
15. Press Speaker.
NEC UX5000
1.From the System Administrator's telephone (normally extension 301), press CALL1 and dial 828.
2.Dial two digits for the hour (24 hour)
For example, 13=1:00 PM.
3.Dial two digits for the minutes.
You hear confirmation beeps.
4.Press SPK to hang up.
NEC SV8300 / NEAX 2000 IVS / 2000 IVS-2 / 2000 IPS
With Dterm Series III, Series E and Series i Phones
**CAT Mode Procedure: This is to be done while the phone is in an idle state.
Press "TRANSFER"
Press "CONF"
Press "*"
Press "TRANSFER"
Press "CONF"
Press "#"
"CAT MODE" displayed on LCD
Press "REDIAL or LNR/SPD"
"COMMAND" displayed on LCD
Press "02"
Press "RECALL"
Press "2"
Press "RECALL"
"02>2>Current Time" displayed on LCD
Input correct time using Military Time (HH MM SS)
Press "CONF"
NEC Electra Professional Level I, Level II, Level II Advanced,
Electra Pro 120, Electra Elite 48, Electra Elite 192
**Changing the time on a Electra Elite & Professional system must be done from the "main" or primary phone. It is usually extension # 100.
1. Press "FEATURE"
2. Dial "9#"
3. Enter hour and minute
4. Press "RECALL" to change AM/PM setting
5. Press "HOLD" to change the calendar setting
6. Press "RECALL" to change the day of week
7. Dial "#" to move the cursor to day of month field
8. Enter day of month
9. Press "RECALL" to select month
10. Dial "#"to move the cursor to year field
11. Enter last 2 digits of year
12. Press "FEATURE"



bottom of page