Quick Links to CCC...
Solutions
|
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.
|
NPS® Update
Current NPS®: 83.98% Surveys Completed: 860
Click here to learn more about Net Promoter Score. |
Trivia
Trivia Answer
Events in the daily life of stand-up comedian Jerry Seinfeld can best describe this series. Jerry and his friends Elaine, George, and neighbor across the hall Kramer eat frequently at "The Restaurant," as it is noted in establishing scenes. There is no lettering on the windows in these scenes either. However, an inside shot looking out indicates "The Restaurant" is really what eatery?
ANSWER: Monk's Cafe/Tom's Restaurant
WINNERS: Wiley Chandler Ann Lehman Dan Kurkiewicz Jim Poull _________________ New Trivia Thomas Magnum, a former naval intelligence officer turned private detective, lived on the estate of pulp writer Robin Masters in return for providing its security. As a P.I., how much did Magnum charge per day?
|
|
|
|
Ask the Expert "Mitel Audio and Web Conferencing"
Jazmine Rodriguez, Customer Care Center Supervisor
Mitel Audio and Web Conferencing allows you to schedule and manage conferences through a Web-based interface. With audio conferences, you can; upload documents to present to callers during a conference call,mute, drop, and add participants, and place individual participants on hold while the call is in progress. With Web conferences, you can; upload documents, transfer files, record the conference, chat online and broadcast videos. Share applications or your desktop, use white board features, and co-browse the Internet with attendees. Read more...
|
Register for CCC Training "Outlook/Exchange Mailbox Clean-up"
Wednesday, September 26, 2012, 12:00pm-1:00pm CST
The CCC Training Center is holding the next session in our 2012 training series on Wednesday, September 26, 2012 from 12pm-1pm CST. This course will be lead by CCC Senior Systems Engineer, Johnny Christian.
Everyone is invited to attend the live classroom session or the online webinar portion. This course is available free of charge to CCC customers with ConvergeAssure® Voice Managed Services (phone system maintenance), and ConvergeSecure® Managed Services (data, security, backup & recovery, data vaulting, and/or cloud services).
Course Overview
Johnny will be sharing some tips and best practices for cleaning up mailboxes in Microsoft Outlook. Topics of discussion will include:
- How to discover your folder size
- Understanding bits and bytes
- How to run built in clean-up tool
- How to sort on date, size, attachments, etc. and delete older items
- Emptying out junk folder, spam folder (if any), deleted items, sent items, etc.
- How to configure empty deleted items folder upon exit
- How to archive older emails to a .pst file
- How to release attachments from outlook messages to free up space
- How to avoid an attachment if sending internally using shared link
- Automatically manage attachments using add-ins
- General tips on how to keep your mailbox small
Click here for course details and registration info...
|
RedSky's E911 Anywhere® For Small and Medium Sized Enterprise
RedSky's E911 Anywhere® is the perfect E911 solution for small and medium businesses who need a low cost, high performance E911 system.
Small and Medium businesses need a low cost E911 solution that enables them to meet all state regulations and provide their employees with the E911 protection they deserve. E911 Anywhere® is a cloud-based service that gives companies complete E911 protection in a Software as a Service (SaaS) model. SMBs can quickly and easily provide E911 protection for every phone in their enterprise by managing phone locations through the E911 Anywhere® Web portal and by sending 9-1-1 calls to the E911 Anywhere® data center. No large capital costs - no software or hardware costs. Service-based model lets you pay for the service you need.
E911 as a service
No large capital costs - no software or hardware costs. Service-based model lets you pay for the service you need. Become E911 compliant in as little as 48 hours.
Simplification of 9-1-1 call routing
All 9-1-1 calls are sent to E911 Anywhere® eliminating the cost of local 9-1-1 trunks or gateways and the need to open PS-ALI accounts with Local Exchange Carriers.
Easy management of phone locations
The E911 Anywhere® Web portal gives 24/7 access to the system and allows administrators to easily move, add and change the locations of their phones.
Cost effective
You pay a one-time service initiation fee and an annual service contract for the number of phones or ELINs you use. You can start small and add services as you need them.
For more information about RedSky's E911 Anywhere call us today at 877.282.9227 or contact your CCC Technologies' Representative.
Read more...
|
Communications Availability Challenges Giving you the Blues..?
Diane Royer, Avaya

When you travel to conferences and meetings, and when you're in road warrior mode it's great to have access to work systems on your mobile devices.
However, none of us look forward to the inevitable nuisance request arriving at 8:00 pm in the middle of your evening, when your co-workers happen to know that you're still "on line". It's hard to disregard that so called "urgent request" that is urgent for someone else, but an inconvenient nuisance for you. I call this a case of the blues that quite frankly we all want to avoid.
The beauty of living in today's on-the-go, bring-your-own-device society is that you can connect with just about anyone, anywhere, anytime. The downside is that just about anyone can connect with you, anywhere, anytime - and expects to do so.
Read more...
|
Experience Mitel UC360 Collaboration Point
|
ESI End-of-Life Notice
ESI announced the end-of-life, effective August 31, 2012, of several ESI port cards and the IP200e Generation II Base Cabinet. The list below includes important end-of-life milestones and dates for these products, all of which are no longer available for orders/shipping from ESI.
- 612 port card for IVX E-Class - Last date of support 2/22/2015
- 684 port card for IVX E-Class - Last date of support 7/16/2016
- D12 port card for IVX E-Class - Last date of support 3/23/2016
- DLC12 port card for IVX E-Class - Last date of support 12/02/2016
- A12 port card for IVX E-Class - Last date of support 5/01/2014
- 482 port card for IVX S-Class. (Note that this is a very old version of the card. The current 482 card for the ESI-50, ESI-50L, ESI C-Plus Executive, ESI C-Plus, and IVX S-Class remains available as usual.) - Last date of support 8/12/2016
- IP 200e Generation II Base Cabinet - Last date of support 2/20/2013
Please note: The end-of-life of these products should not be interpreted as the discontinuance of any ESI agreements to support the existing population of the noted product(s) in the field. ESI Technical Support, parts, and services to existing installed products will continue to be provided until the Last Day of Support.
If you have any questions, or need additional information, please contact us at 877.282.9227 or reach out to your CCC Technologies' Representative.
|
 Organizations these days have their hands full with security and management challenges brought about by the Bring Your Own Device phenomenon. But why stop at devices? Good question. In fact, the same culture of innovation and self-reliance, spurred by BYOD, has increasingly translated to applications. And as such, users are pushing the trend to its limits by introducing their own applications into the workplace to meet their needs. The burgeoning Bring Your Own Application (BYOA) trend appears to be a natural and logical extension of BYOD-and the BYOD mentality. A recent Fortinet survey conducted earlier this year indicated that one in three users would or has actively gone against company policies banning personal devices in order to do their jobs. Meanwhile, 69 percent of respondents indicated that they are interested in BYOA, in which they could create and use their custom applications at work. Not surprisingly, when asked whether companies have policies that ban the use of non-approved applications, 30 percent admitted they have or would ignore those policies. In short, if you're an IT administrator, you're looking at lots of Red Bull and some long days ahead. In actuality, the BYOA trend is not entirely new. Organizations have been dealing with users who have either brought or built their own applications into work to enhance productivity for as long as computers have been used in the workplace. However, the consumerization of IT and the explosion of mobile devices now used for business related tasks has truly cultivated an environment that sets BYOA on a course for exponential growth. According to Ryan Potter, Fortinet director of security strategy, the phenomenon's anticipated upward spike will likely be propelled by two kinds of users: those who bring their own apps and those who build them. Read more... Threat Reports August 8-22, 2012Click here to learn more about Unified Threat Management solutions from CCC Technologies, Inc.
|
Virtualization and Backup: Keep Your Friends Close and Your Enemies Closer
Mark Campbell, Unitrends | Modern Backup 2 Blog
 Paul Venezia at InfoWorld has a great article entitled When Virtualization Becomes Your Worst Enemy. His introduction will ring true to anyone who has been in IT a while - and it should be required reading for new IT staff. "
Try as we might to keep chaos at bay, there will come a time when the perfect storm hits and everything falls apart. Usually a confluence of elements triggers total meltdown, but sometimes one overlooked weak link fails and causes a cascade of problems that takes an entire network offline. These situations are never easy to deal with and are generally compounded by the fact that admins are feverishly working to fix problems while being bombarded with alarms from other systems that are also failing due to the initial outage. It's like trying to rebuild a house while it's falling down on top of you."
One of the best things that virtualization can be one of the worst things about virtualization: the fact that you have fewer physical machines performing with a higher workload. Paul notes that fewer machines mean more opportunity for the chaos to occur since each failure has more potential impact on the rest of the IT infrastructure. This means that your plans and implementation for what happens when something goes wrong is more important than in physical-only environments - or in environments that have less virtual server consolidation than those with more server consolidation.
Backup - by its very name and nature - is there for when things go wrong. So backup planning and implementation is more important as virtualization is not just introduced but optmized in any environment and server consolidation is realized.
So if virtualization can become your enemy in this situation, and backup is your friend, how do you make sure that you can rely on your friend? The key attributes you're looking for in your "friend" (i.e., backup) here are flexibility and heterogenity. In our next blog post, we'll discuss this in detail.
Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
|
How to Become a Better Communicator With Your IT Staff
Do you find that you or your IT team members aren't communicating as well as they could or should? If you said 'yes,' here are two powerful techniques you can apply to significantly improve the way you communicate and the impact you achieve.
Do you ever wish that your IT staff communicated more effectively? With key stake holders? With each other? And with you? Do your team members frequently go into too much detail when they communicate? Talk too much and listen to little? Get hung up on arguing their point rather than building consensus? Walk away from conversations before they've achieved and confirmed a shared understanding? Do you ever find that you can't get past the second slide of your PowerPoint deck in a meeting? Or that your boss starts interrupting your answers with more questions, before you've answered her last one? If you answered "Yes" to any of these questions, check out the following two powerful techniques to improve your communication skills. Read more... |
|
|
|