2011 Newsletter Header
Find us on Facebook View our profile on LinkedIn Follow us on Twitter

January 2012
In This Issue
NPS Update
Trivia
Mitel Training 1/25/12
Ask the Expert - Jan
Avaya one-X Mobile
Mitel Mobile Wireless
ESI End of Life
Security Minute
Exchange Server Protection
Microsoft Virtualization
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS

Current NPS®: 83.90%
Surveys Completed: 691

Click here to learn more about Net Promoter Score. 
Trivia
Trivia

Trivia Answer

 

"There's a new boy in the neighborhood; lives downstairs and it's understood he's just here to take good care of me like he's part of the family."

 

ANSWER:  

Charles in Charge

 

WINNERS:

Cris Martinez
Wiley Chandler
Dan Kurkiewicz

______________    

New Trivia  

We are sticking to TV Themes this month - good luck!

 

"Show me that smile again... don't waste another minute on your crying, we're nowhere near the end, the best is ready to begin."

 

Register for CCC Training
"Mitel 5000 Administration and Maintenance"
Ryan Kuchenbecker, Convergence Engineer

Managed ServicesThe CCC Training Center is holding the first session in our 2012 series on Wednesday, January 25, 2012 from 12pm - 1pm CST. You are invited to attend the live classroom session or the online webinar portion. This course is available free of charge to CCC customers with ConvergeAssure® Voice Managed Services (phone system maintenance), and ConvergeSecure® Managed Services (data, security, backup & recovery, data vaulting, and/or cloud services).

Course Overview

Ryan will be providing a high level overview of the capabilities of the system programming and maintenance software that is used to interface with the Mitel 5000 controller. Topics to be covered include: basic programming, data capture (logs), SMDR, and more.

 

Click here for course details and registration info... 

 

Ask the Expert
"Using FTP to Get and/or Put Announcements on Your Avaya Gateways"
Cyndy Martino, Sr. Contact Center Specialist/Engineer
Cyndy Martino
This month, CCC Senior Contact Center Specialist and Engineer, Cyndy Martino, is explaining how you can transfer announcements to and from your Avaya Gateways using FTP. This is an alternative method of transferring announcements if you do not have Voice Announcement Manager software.


Read more...
Avaya one-X Mobile SIP Version 1.0.2
Now Available on iTunes 

Avaya one-X Mobile iTunes IconAvaya one-X Mobile SIP for iOS 1.0.2 is
now available on the iTunes App Store. This new release extends enterprise telephony capabilities to an iPod Touch, iPhone or iPad, and allows customers to use their enterprise Avaya Aura® telephony services. New capabilities include bridged line appearances, VPN support, and support for iOS 5, among others.

Avaya one-X Mobile SIP Screen 2 

Notes: The new client will not work without customers having a license file in place and posted on a webserver that all clients can reach, and users must update the settings on their 1.0.2 client to point the "Configuration" setting to the URL address of the .plist license file.  To get a license file, customers or partners must have previously purchased the necessary quantity of client licenses for Avaya one-X Mobile SIP for iOS.


Download Avaya one-X Mobile SIP at iTunes
Learn More About Mitel Mobile Wireless Solutions

 Mitel Mobile Wireless    

Mitel Mobile Wireless Services

Simplify your communications services by unifying wireline and wireless services on one invoice from one service provider. Mitel Mobile wireless service from Mitel NetSolutions offers nationwide voice and data wireless services to business customers.
ESI End-of-Life Notice:
Legacy ESI Feature Phones 

ESI_LogoESI announces the end-of-life, effective December 29, 2011, of several ESI Feature Phone models.
Please note that each item will be sold only while supplies last. (To verify stock status, please contact your CCC Technologies' representative or our Customer Care Center at 866-347-3780.)  

 

 

The following older ESI Feature Phones have reached "end-of-life" status and are no longer available:

  • 5000-4251 / 5000-0251 -- 12-Key Digital Feature Phone
  • 5000-4235 / 5000-0235 -- 24-Key non-backlit Digital Feature Phone (original 2003 version)
  • 5000-4499 / 5000-0499 -- 24-Key backlit Digital Feature Phone
  • 5000-4238 / 5000-0238 -- 48-Key non-backlit Digital Feature Phone (original 2003 version)
  • 5000-4290 / 5000-0290 -- 48-Key non-backlit Digital Feature Phone (older version with headset jack)
  • 5000-4500 / 5000-0500 -- 48-Key backlit Digital Feature Phone
  • 5000-4291 / 5000-0291 -- 48-Key TAPI Digital Feature Phone (with headset jack)
  • 5000-4237 / 5000-0237 -- 48-Key IP Feature Phone I (local IP; original 2003 version)
  • 5000-0239 -- 48-Key Remote IP Feature Phone (original 2003 version)
  • 5000-4289 / 5000-0289 -- 48-Key IP Feature Phone I (local IP; with headset jack)
  • 5000-4501 / 5000-0501 -- 48-Key backlit IP Feature Phone II
The Last Date of Support for these items is December 29, 2016.

PLEASE NOTE: ESI is NOT discontinuing the 24-Key Feature Phone or the 48-Key Feature Phone. Current models continue to be available for purchase, these are older models.
Fortinet Security Minute - January 2012

Derek Manky, Fortinet's senior security strategist, wraps up 2011 with his predictions of the network security threats we might see in 2012.

 

 View the December Threat Report

 

Click here to learn about Unified Threat Management solutions from CCC Technologies, Inc. 

Microsoft Exchange Server Data Protection

Mark Campbell, Unitrends | Modern Backup 2 Blog 

Backup & Recovery
In 2009 with Release 4.2, Unitrends re-architected our fundamental approach to protecting Exchange. We also started offering support for Exchange 2010 along with 2007 and 2003.

 

Over the next few blog posts, I'm going to present an overview of the Exchange data protection architecture provided by Microsoft and then explore the ways that Unitrends offers the best Exchange protection in the industry.  

 

Microsoft Exchange Data Protection Architecture

Exchange has traditionally been protected using the "streaming backup" method that was encoded in Windows Server 2003 "ntbackup."  With Windows Server 2008, Microsoft moved away from the traditional online streaming backup to VSS (Volume Shadow Copy Service).  VSS-based Exchange backups (also called "snapshots") are available for both Windows Server 2008 and Windows Server 2003 for Exchange Server 2010, 2007, and 2003.

 

Exchange has an associated VSS writer.  When the Exchange VSS writer is asserted, it creates a point-in-time image (snapshot) of the appropriate data.  This point-in-time image is called a "Shadow Copy."  There are two basic types of Shadow Copies:

  1. Clone (Full Copy or Split Mirror):
  2. Copy on Write (Differential Copy)

The VSS infrastructure for Exchange consists of the following components:

  • Writer: A writer provides a consistent point-in-time image by quiescing Exchange Server when it is asserted.
  • Provider: A provider is the interface to the point-in-time image created by the VSS writer.
  • Requestor: This is the software that invokes VSS and manages the shadow copy.  Unitrends has created the requestor for Exchange 2010, 2007, and 2003.

In the upcoming post, I'm going to discuss the high-level attributes of the requestor's implementation within the Unitrends' appliance architecture. 


Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.

Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
Microsoft
Getting Started with Virtualization

Managed Services

Virtualization: the concept seemed to burst upon the business world in full force this past year. Suddenly, the CEO and CFO of every midsized company seem intrigued by how virtualization can cut IT expenses - as well they should be. But as a CTO or IT manager, you know that virtualization can do much more than save money. You also understand how a well planned virtualization strategy can help make your company more agile and go a long way toward increasing the security and integrity of the data that's the lifeblood of the organization.

 

With company purse strings loosening in anticipation of a robust economic recovery, now is an ideal time to make the case for an investment in virtualization. But making this case requires some thought and planning. You need to be ready to explain to non-technical managers the various advantages of virtualization - in terms they'll understand.


 Read more...