Quick Links to CCC...
Solutions
|
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.
|
NPS® Update
Current NPS®: 84.64% Surveys Completed: 771
Click here to learn more about Net Promoter Score. |
Trivia
Trivia Answer
"Don't go to bed with no price on your head... don't do the crime if you can't do the time..."
ANSWER: Baretta
WINNERS: Dan Kurkiewicz Ann Lehman Cathy Kingore Scott Smith Mary Wild Jim Poull
______________ New Trivia We are sticking to TV Themes this month - good luck!
"There is nothing wrong with your television set, do not attempt to adjust the picture... For the next hour sit quietly and we will control all that you see and hear. You are about to participate in a great adventure; you are about to experience the awe and mystery which reaches from the inner mind to ____." |
|
|
|
Ask the Expert "The Infamous Blue Screen of Death"
Darek Komen, ConvergeSecure® CSU Engineer
We have all seen it before, the infamous "Blue Screen of Death" or BSOD. Here we are, minding our own business, trying to get some work done, and your computer decides to not cooperate with your request. Instead it decides to present you with a blue screen with white letters. You'll undoubtedly ask the questions: What do they mean? Why am I getting them? How do I fix it?
Read more...
|
Register for CCC Training "Microsoft Outlook 2010 Tips & Tricks"
Wednesday, May 30, 2012, 12:00pm-1:00pm CST
The CCC Training Center is holding the next session in our 2012 training series on Wednesday, May 30, 2012 from 12pm-1pm CST. This course will be lead by CCC ConvergeSecure® Supervisor, Dan Labriola, reviewing Microsoft Outlook 2010.
Everyone is invited to attend the live classroom session or the online webinar portion. This course is available free of charge to CCC customers with ConvergeAssure® Voice Managed Services (phone system maintenance), and ConvergeSecure® Managed Services (data, security, backup & recovery, data vaulting, and/or cloud services).
Course Overview
This training session will help each individual become comfortable with the Outlook 2010 application, and learn all the essential operations of the application. Individuals will learn Outlook fundamentals and gain expertise in the following areas: Composing, Sending and Receiving Emails, Advanced Email Features, working with Contacts/Address Book, and using the Calendar. This is ideal for those who need a refresher in Outlook 2010 or are looking to build vital skills in the program
Click here for course details and registration info..
|
CCC Technologies Named Avaya Business Partner of the Quarter in the Midwest
 CCC Technologies is very proud to announce that we were recognized as Avaya's Business Partner of the quarter for the second quarter of fiscal year 2012 in the Midwest Region. Partners are chosen by their Avaya Channel Sales team based on their level of success and achievement towards metrics, and by demonstrating one or more of the following: unique teaming, engagement, differentiated solutions or programs, significant revenue QoQ or YoY, certifications or trainings.
|
Avaya End of Sale Summary
Avaya has released several End of Sale (EoS) announcements since January of 2012. Please click the link below for a summary.
Download Avaya's List of Recent EoS Notices If you have questions or would like more information about this announcement, please contact your CCC Technologies' Representative.
|
Learn More About Mitel in a VMWare Environment with Call Center Support
|
Switching to VoIP Can Save You Money, if Your Network is Ready
ESI Blog - May 3, 2012

In response to a recent article in PC World titled, "How Switching to VoIP Can Save You Money," (see Source link below) we thought it might be informative to add our two cents.
SIP Trunking (VOIP) can be used effectively in larger installations as well. Most SIP trunks can be provisioned to offer DID's so that calls can be routed through an on-premise platform directly to an individual extension. While there are cost benefits that can be realized without degradation of service, in most cases the company implementing these SIP trunks or VOIP services need to be sure that their internal networks and Internet access points are configured directly.
Here's a scenario that happens almost every day - sending packets of voice over an Internet pipe that only has a certain bandwidth, and at the same time, someone or several people try to download a video or even download or upload a large software program. Those voice packets have to compete with the other packets for space in the pipe. This can cause what is known as latency or jitter which degrades voice quality. Best practices suggest that businesses should have separate access to the Internet for voice traffic or install end-to-end circuits that guarantee a quality of service (QOS). Applying such best practices can increase the cost of a SIP Trunk or VOIP deployment but ultimately provides better quality while still providing a reduction in costs.
Most SMB's do not have large IT departments so we suggest they work with a qualified reseller to implement these services. The qualified reseller will help ensure that the networks are configured correctly to provide cost savings with limited to no sacrifices in quality. ESI works with over 600 qualified resellers in the SMB space that can offer these implementation services along with other quality voice video and access solutions.
Article source: PC World
|
 You ran all the scans, conducted all the tests and yep...you've got malware. Last month, we detailed steps you could take in those critical and panic-filled moments when you realized that you might have clicked on a malicious link or opened an infected attachment, but weren't quite sure you'd been infected. Now, in a follow-up, we'll note a few actions you can take in the event that malware was indeed installed on your computer. First, nothing substitutes for the expertise of an IT professional for an accurate assessment of your computer's health. In any event, the best thing users can do is take their machine to be diagnosed and/or cleaned by a true expert. Meanwhile, there are some things users can do that certainly won't make the situation worse and might even help prevent the infection from spreading. Read more...Threat Report April 18 - May 2 Click here to learn about Unified Threat Management solutions from CCC Technologies, Inc.
|
Everybody Lies: Backup and Secret Agents
Mark Campbell, Unitrends | Modern Backup 2 Blog
 Back in a simpler time - a few years ago - there were two types of backup vendors: those that used agents to protect computers and those that were agentless. The backup vendors that used agents would promote the advantages of backup agents on the protected computer in terms of handling the specific capabilities associated with the operating system and applications; those backup vendors that promoted agentless backup would call out that without agents you had less maintenance because you didn't have to install the agents. The backup vendors that used agents would call out the security advantages for their own authentication mechanisms; the backup vendors that were agentless would note their security features for using what typically was simply a privileged username and password. Backup vendors who provided agentless solutions would note that because they didn't use an agent they had less impact on the computer being protected - agent-based backup vendors would scoff and discuss the load of the relatively "chatty" CIFS/SMB or other protocols that were used by the agentless backup vendors. Read more... Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
|
Hostage Crisis in the Cloud: Can You Rescue Your Data?
Outsourcing contracts typically include termination and transition assistance provisions that outline the IT service provider's responsibilities regarding returning data. IT buyers are surprised to find out that their cloud computing contracts contain no such provisions.
In traditional outsourcing deals-in which the service provider hosts massive amounts of customer data-the issue of returning that data to the customer is now largely settled. Outsourcing contracts typically include detailed termination and transition assistance provisions that outline the provider's responsibilities regarding data return. Indeed, in many outsourcing contracts, the vendor agrees to provide the data promptly whenever the customer ask for it in the format that the customer requests-and the provider often covers the cost of doing so.
Read more...
|
|
|
|