Quick Links to CCC...
Solutions
|
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.
|
NPS® Update
Current NPS®: 82.94% Surveys Completed: 866
Click here to learn more about Net Promoter Score. |
Trivia
Trivia Answer
Thomas Magnum, a former naval intelligence officer turned private detective, lived on the estate of pulp writer Robin Masters in return for providing its security. As a P.I., how much did Magnum charge per day?
ANSWER: $200.00 per day
WINNERS: Dan Kurkiewicz _________________ New Trivia Tim Taylor is the host of a comical home improvement show in Detroit. Time is obsessed with tools, especially those made by the show's sponsor, Binford Tools, and likes to shop for them. Where is he considered a valued customer?
|
|
|
|
Ask the Expert "Setting up Abbreviated Dialing Lists for Avaya Communication Manager"
Matias Trevino, Customer Support Unit Engineer
 Abbreviated Dialing Use the Abbreviated Dialing (AD) feature to reduce the number of digits that you must dial to place a call. Instead of dialing the entire number, you dial a short code to access the number. The system then dials the stored number automatically. You can also assign abbreviated dialing buttons to telephones, so that you press a single button to dial frequently called numbers. Abbreviated Dialing is sometimes called speed dialing. Read more...
|
Visit Us at Upcoming Events
CCC Technologies is "on the road" this fall attending some important events in Illinois and Wisconsin and we would love the opportunity to see you! Below is the schedule of our upcoming live events including booth information, speaking sessions, and registration info. OCTOBER
BuildExpo Chicago
The Nation's Premier Building and Construction Show Date: October 17 & 18, 2012 Location: McCormick Place (Lakeside Center Hall D1) Booth: 327 Registration: FREE More information: http://www.buildexpousa.com/chicagohome.htmlWHTA 17th Annual Fall Education Conference
Wisconsin Healthcare Technology Association Date: October 31 - November 2, 2012 Location: Madison Concourse Hotel (Madison, WI) Speaking: CCC has partnered with Fortinet to present a session "Say Yes to BYOD" on Thursday November 1, 2012 Booth: CCC will have a booth at the vendor exposition on Friday 11/2 Registration: Membership is required for attendance More information: Email whta@wi.rr.comNOVEMBER
GMIS - GIANTS 2012
Government Management Information Sciences Illinois - Annual Networking + Training Symposium Date: November 11-14, 2012 Location: Eagle Ridge Resort (Galena, IL) Booth: CCC will have a booth throughout the event Registration: Membership is required for attendance More information: http://www.gmis-il.org
|
Are You Registered to Receive Important Product Updates from Avaya?
Are you familiar with Avaya's updated support website? Did you know that you can register to receive important updates about Product Correction Notices (PCN's), Security Advisories, Firmware updates, and End of Sale (EoS) Notices? We recommend all Avaya system Administrators register on Avaya's support website and subscribe to updates regarding their systems and releases. Avaya's support website: Avaya Support WebsiteRegister to receive updates: Avaya Support Website Registration*Please note you will need your system Sold To number in order to register.
|
See You at Avaya Evolutions Unleash the Power of We
Thursday, November 1, 2012
BE A PART OF COLLABORATION HISTORY
JOIN US ON NOVEMBER 1, 2012
Join Avaya in an immersive collaboration experience featuring Steve Wozniak, co-founder of Apple, Inc. and Henry Dewing, Principal Analyst at Forrester.
This action packed event begins with a strategic overview from Avaya executives, followed by industry trends and the economy's impact on IT from Forrester. Next, you'll have a choice between three breakout sessions featuring customer case examples on how businesses have transformed their customer service and team collaboration through Avaya solutions.
We'll wrap up the day with a fireside chat between Steve Wozniak, co-founder of Apple, Inc. and Brett Shockley, Senior Vice President & General Manager of Avaya Applications and Emerging Technologies. You'll have a chance to actively join the conversation by tweeting a question for Steve using #AvayaEvolutions.
Don't miss the opportunity to engage, interact, and collaborate with Avaya executives, peers, and industry leaders during this day-long collaboration experience.
|
Experience Mitel UCA Mobile 5.1 for Android
Dave Spence (Mitel Product Line Manager, UCC) gives us a sneak peek tour of Mitel Unified Communicator® Advanced (UCA) Mobile 5.1 for Android™, including the new SIP softphone and configuration, and corporate directory access with realtime presence.
|
CCC Technologies Completes New Certifications for ESI
CCC Technologies is very pleased to announce that our ESI engineers have successfully completed the following certifications:
- ESI Hardware and Installation Certification
- ESI Programming Certificaton
- ESI Media Management Certification
- ESI Mobile Messaging Certification
- ESI Presence Management Certification
- ESI Video View Certification
CCC Technologies has completed all necessary certifications and continuing education required to continue to offer and support the full line of solutions from ESI.
|
 In June 2008, Microsoft officially announced that it planned to discontinue support for its popular but aging Windows XP operating system by April 2014. To many system administrators' chagrin, the move will galvanize many organizations to begin migrating to newer operating systems, such as Windows 7 or the much anticipated and soon-to-be-released Windows 8. Unfortunately, during this process, legacy XP systems will become increasingly vulnerable to zero-day attacks and other security threats. The sudden absence of support for XP leaves a void that will likely be filled by a slew of old and/or soon-to-be-discovered vulnerabilities and subsequently give rise to a new crop of security exploits that specifically target these legacy systems, which are now devoid of security updates or support. After a recent FortiGuard Labs malware database query where our threat research team looked at the same day of each year for the last 13 years, the team analyzed the number of vulnerabilities the systems captured and concluded that older operating systems typically have more exploit activity due to the fact that myriad exploit kits and existing malicious code have had ample time to mature and circulate. It's also harder today to get a working rootkit for Windows 7 than Windows XP thanks to Microsoft technology such as PatchGuard, which protects the kernel of an operating system from being unduly modified. An August 2012 snapshot of reported attacks from the start of this year shows that a massive number of attacks are based on exploits discovered many years ago. FortiGuard reports 47 million instances of attacks based on exploits discovered in 2004 alone! Read more... Threat Reports September 5-19, 2012Click here to learn more about Unified Threat Management solutions from CCC Technologies, Inc.
|
Virtualization and Backup: Keep Your Friends Close and Your Enemies Closer II
Mark Campbell, Unitrends | Modern Backup 2 Blog
In a prior post, we explored an article by Paul Venezia over at InfoWorld who has a great article entitled When Virtualization Becomes Your Worst Enemy. His overall thesis can be summarized as virtualization can go from being your best friend to your worst enemy when problems start occurring within your IT infrastructure. The reason is that the physical server consolidation (more virtual machines running on fewer physical machines) means that if a single physical server fails, you have a much wider impact. When virtualization becomes your enemy, technology, such as backup, becomes your best friend.
So, as I note at the close of the prior post, if virtualization can become your enemy in this situation, and backup is your friend, how do you make sure that you can rely on your friend? The key attributes you're looking for in your "friend" (i.e., backup) here are flexibility and heterogeneity.
What do I mean by flexibility and heterogeneity? What always concerns me in backup is how flexible a solution is. For example, I've heard passionate arguments about whether HOS (Host Operating System) or GOS (Guest Operating System) backup is superior. Of course, if you're Veeam or vRanger you're going to argue HOS is superior because that's all you support; if you're AppAssure or any other Windows-only vendor you're going to argue that GOS is better because that's all you've got. If all you have is a hammer, the whole world looks like a nail.
The truth is that the best solution often depends on the specifics of the customer's environment. Typically HOS-level backup works wonderfully; however, GOS-level backup lets you protect VM-attached NASs, physical RDMs, granular inclusion/exclusion of data, granular replication, protection of free (unlicensed) VMware ESXi (VMware purposely doesn't allow HOS-level protection of free ESXi), and the like. There can be performance differences between the two as well - however, beware of sweeping performance or overhead claims by vendors that don't support both.
Another major reason I like flexibility and heterogeneity is that I've run into situations where there are defects in HOS-level API sets that can be solved with GOS-level APIs, or vice versa. This is relatively rare - but I've found that when it comes to data protection, paranoia is a healthy attitude. How about you? Have any thoughts on HOS- versus GOS-level backup or flexibility and heterogeneity in general?
Read more...
Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
|
5 Dysfunctional IT Relationships -- and How to Repair Them
InfoWorld - In large technology departments, dysfunctional relationships breed like mushrooms in a dank basement. Your dev and ops teams are no longer on speaking terms, while your junior and senior developers can't seem to agree on anything. IT and legal are constantly at each other's throats. Storage wonks are ready to declare war on the database admins, while sys admins seem to be on everyone's bad side.
Why can't they all just get along? In many cases it's the tension between conflicting demands on the same systems -- say, DBAs who complain about network performance but refuse to streamline their storage needs or business users who want to roll out new apps quickly, blissfully unaware of the effect they could have on other critical systems. Fortunately there are solutions. We asked our geek relationship adviser, Crabby van Buren, to help find the common ground between these five warring factions. His advice follows. Read more... |
|
|
|