2011 Newsletter Header
Find us on Facebook View our profile on LinkedIn Follow us on Twitter

June 2011
In This Issue
NPS Update
Trivia
Ask the Expert
FREE Training 6/29
Multi-Tech Fax Finder
Emergency Procedures
Mitel TV
ESI's YouTube Channel
SMB's and the Cloud
Aruba MOVE
Zombie Awareness
Backup & Recovery Blog
Managed Cloud Services
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS

Current NPS®: 80.81%
Surveys Completed: 521

Click here to learn more about Net Promoter Score. 
Trivia
Trivia

Trivia Answer

We are back to TV Themes this month.

"Everywhere you look, there's a heart, a hand to hold on to... When you're lost... and all alone, a child is waitin' to carry you home, everywhere you look."

   

 

ANSWER:  

Full House

 

WINNERS:

Dan Kurkiewicz
Ann Lehman

________________________    

New Trivia  

We are sticking to TV Themes this month - good luck!

"From Hollywood, the glamour capital of the world, join us in the make-believe search for the most beautiful girl on earth...and although this is not a real contest, we will bring you our version of the all-American beauty. The one-of-a-kind girl who not only has personality and poise, but beauty and talent as well...and now, here's your host and start of the show, Mr. Beauty himself, Rip Taylor."
Ask the Expert
How to Spot Fake Security Messages aka "Scareware" Before it's Too Late
George Kalfas, ConvergeSecure® Engineer

George Kalfas

In this month's Ask The Expert, I will be explaining to you how to spot the fake security messages on your computer. Just because you get a virus alert message on your computer does not always mean that it is from your computer. Knowing how to read the fake messages could help you tell the difference between a redirect message and a message from a rogue application.
 

 Read more...
Register for CCC Training
"Troubleshooting IP Telephones"

Wednesday, June 29, 2011, 12:00pm-1:00pm CST 


Unified CommunicationsThe CCC Training Center is holding the next session in our 2011 series on Wednesday, June 29, 2011 from 12pm - 1pm CST. You are invited to attend the live classroom session or the online webinar portion.


Course Overview

Topics covered in this course include: Jitter, packet loss, latency, no dial tone, no audio, no power, phone that stays in discover mode, resetting phones, verifying configuration, data switches, QOS, VLANS, static and dynamic IP addressing, DHCP, HTTP, TFTP.

Click here for course details and registration info

Multi-Tech Systems Announces New Fax Finder® IP Fax Server

Carol Montour, Multi-Tech Systems, Inc. 


Multi-Tech Systems Logo

 

All-in-one fax server solution saves thousands of dollars a year.

 

Multi-Tech Systems announces the new FaxFinder® IP fax server that supports SIP and T.38 fax protocols in addition to V.34 and T.37 "e-mail-to-fax." The FaxFinder IP is an extension to the existing FaxFinder all-in-one fax server product family, providing customers with a secure, convenient solution for LAN users and offers a high degree of privacy for both the sender and recipient.


Read more...
Avaya Emergency Procedures

avaya logoWith tragic natural disasters across the U.S. in recent months, we wanted to share some important information and checklists that can help you and your organization prepare for and recover from events that may interrupt critical communications. We recommend that you print these documents.

 

Read more and Download Emergency Procedure Documentation  

Mitel TV
What Does Freedom Mean To You?

Mitel LogoCanadian Blood Services (CBS) is a not-for-profit, charitable organization that has selected the Mitel Freedom architecture, including UC Advanced and Virtual Solutions. This enables them to connect mobile employees and manage organizational growth and efficiencies.

Click the image below to watch the video on Mitel TV.

 Mitel TV - Canadian Blood Services    

Check out ESI's YouTube Channel

ESI_LogoESI now has a YouTube channel! Earlier this month, they added a new set of videos to ESI's YouTube channel which have a totally different purpose: they are "How-to" videos, showing end users how to perform a variety of tasks using their ESI phones and systems. (As you'll notice, these videos feature the new ESI 60 Business Phone and ESI 40 Business Phone, currently in beta-testing but expected to ship in a few weeks.)

 

Because these videos have this educational flavor, we've placed them on ESI's User's Guide Web site. We believe you'll find them helpful in training end users. More "How-to" videos are coming in the near future.

Selling to SMB's Makes Virtualization, Cloud, Cheaper, Simpler, More Available

Kevin Fogarty, ITWorld.com  


Network Infrastructure Much of the IT industry seems to be reorienting from the big companies that are its bread-and-butter most of the time to small- and mid-sized companies to which it usually caters only when sales are so slow it has no other choice.

The economy's growing again, though, and IT budgets at big companies are growing - at least according to most analyst reports.

 

Big vendor companies are going after small user companies not as a way to boost a stubbornly short list of sales prospects; they're doing it because small- and mid-sized companies are - unusually - buying sophisticated IT systems at almost the same rate as big companies.

 

Well, not buying, really. Renting.

 

Forty-four percent of small- and mid-sized companies already use at least one SAAS or cloud-based system and 70 percent plan to add more during 2011, according to a survey of 1,000 SMBs carried out in December by market researchers MarketBridge. Marketing and sales-related apps are the leading business apps; security is tops among cloud services.

 

Read more...

Click here to learn more about Network Infrastructure solutions from CCC Technologies, Inc.

Click here to learn more about ConvergeSecure Managed Cloud Services from CCC Technologies, Inc.
COMPLEMENTARY WHITEPAPER
The Aruba Mobile Virtual Enterprise


Aruba Networks Logo2011 marks the beginning of the post-laptop era. Mobile devices - whether or not they were intended for corporate use - are making their way onto enterprise networks by the millions.

Enterprise mobility has come to the mainstream along with many other attributes of the socialized consumer Internet experience: multimedia content, heavy use of rich collaboration technologies, and cloud-based applications.

Users are embracing these changes as an integral part of how work gets done. But for IT, the new realities are overwhelming a network budget whose foundation supports a legacy design that dates back to the client-server era:
  • Siloed networks that duplicate functions and infrastructure at the access layer.
  • Fragmented service at the edge of the network where applications meet users and devices.
  • Multiple bolt-on technologies that fail to address the unique needs of user mobility.

As long as enterprises remain entangled in this legacy access infrastructure, IT will be forced to respond to users by saying no - to mobility, to mobile devices, and to accessing business-critical applications.

 

Aruba MOVE™ unifies disparate wired, wireless, and remote access methods into one cohesive access solution - for traveling business professionals, remote office workers, corporate headquarters employees, and guests. Access privileges are context aware, i.e. based on user, device, application, and location, and this dictates the type of network resources each person is entitled to.

 

Aruba MOVE Whitepaper 

Download the Complimentary Whitepaper 

Fortinet Security Minute
Zombie Awareness Month

Derek Manky, Fortinet

Byte-Level Versus Block-Level Deduplication and Backup

Mark Campbell, Unitrends | Modern Backup 2 Blog 


Backup & Recovery

Unitrends supports byte-level deduplication on its backup appliances with its current release 6.  Since there's some confusion concerning byte-level versus block-level deduplication, I thought I'd take the opportunity to explain the differences between file-level deduplication (what Unitrends supported prior to release 6), block-level deduplication, and byte-level deduplication.

 

File-level deduplication operates by eliminating redundant files.  Despite what many pundits state, file deduplication is very efficient (and note that I'm stating this even though Unitrends employs byte-level deduplication with release 6.)  The reason is two-fold: the concept of temporal data access locality and the concept of data getting "colder."  The bottom line to both of these concepts is that statistically data that has been recently used is more likely to be re-used again while data that hasn't been recently used is less likely to be re-used.  Another consequence of this behavior is the reason that master/differential backup policies have held up so well over time - data usage temporarily tends to be "clumped" together.


Read more...

Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.

Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
ConvergeSecure® Managed Services
Offsite Data Vaulting, Hardware, and Application Hosting

Managed ServicesWhether you are looking for a secure offsite vault for your data backup or you are interested in moving your entire infrastructure to the "cloud," CCC Technologies' experts can help to design, implement, and manage a solution that supports your current and future objectives. Our data center integrates temperature control systems, smoke detection, fire suppression systems, and continuous secured access control systems, letting you focus on your business rather than your technology.

Read more about our data center features

Click here to learn more about ConvergeSecure® Managed Services from CCC Technologies, Inc.