2011 Newsletter Header
Find us on Facebook View our profile on LinkedIn Follow us on Twitter

March 2013
In This Issue
NPS Update
Trivia
Ask the Expert - March
CCC Jumble - March
End of Support Reminder
Capitalize on BYOD
New ESI Website
Sensible Network Security
Unitrends Blog
4 Keys to BYOD
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS

Current NPS®: 82.86%
Surveys Completed: 978

Click here to learn more about Net Promoter Score. 
Trivia
Trivia

Trivia Answer

 

Sabrina Duncan, Jill Monroe, and Kelly Garrett were the original "Charlie's Angels." Each was a former officer with the L.A.P.D. Jill's sister Kris Monroe, replaced her; Tiffany Welles replaced Sabrina; and Julie Rogers replaced Tiffany. Julie was also an L.A.P.D. office, but what police departments did Tiffany and Kris represent?

 

ANSWER:
Tiffany (Boston), Kris (San Francisco

 

WINNERS:

Wiley Chandler 

Dan Kurkiewicz   

_________________ 

   

New Trivia  

 

Bud Abbot and Lou Costello, playing out-of-work comedians seeking employment, lived at the Fields Rooming House at 214 Brookline Avenue. How much a week did they pay in rent?
Ask the Expert
"Administering Bulletin Board for Aura® Communication Manager"
Josh Rodriguez, Sr. Convergence Engineer
Joshua Rodriguez Did you know that Avaya Aura® Communication Manager has a Bulletin Board feature that allows users to post messages between users on the server?

This month, Josh shows us how to administer users for the Bulletin Board and how to enter, change, and manage information posted to the Bulletin Board.
 

Read more...

CCC "Jumble" - March Edition
(Thanks Jerry)
A very special thank you goes out to our Operations Manager, Jerry Pawinski, for the latest fun addition to the monthly newsletter, the "CCC Jumble." Jerry will be contributing a new jumble for each newsletter.

We may just have to dip into our "prize closet" for our winners, no Google or Wikipedia to help you here. We will publish winners and the solution to jumble in the following month's newsletter.

Click the picture below to download the jumble. Completed entries should be emailed to Kim Kiefer at kkiefer@ccc1.com

GOOD LUCK!

*REMINDER*
Octel Aria® 250 and 350 Systems Reach  End of Support June 2013
avaya logo As originally published in July of 2011, support for Octel Aria® 250 and 350 systems will end in June of 2013.

There are two identified issues with the systems that do not have viable
patches or workarounds and will critically affect system performance:
  • These systems cannot announce the years 2013 and later. Starting January 1, 2014, this impairs these systems' ability to announce the message origination year for messages originated 2013 or later. Message origination year only plays when the year originated is different than the year the message is accessed.
  • On November 15, 2015, the system calendar will reset to January 1, 1984. Systems will be unable to send or receive new messages and auto attendants, holiday schedule and message date stamps, and other functionality will be impaired.

Please contact your CCC Technologies Representative or contact our Customer Care center for details and explore your options for replacing these systems.

 

Customer Care Center Phone: (866) 347-3780

Customer Care Center Email: CustomerCareCenter@ccc1.com  

Mitel Logo The other day I tried an experiment. I went one full business day without my mobile. To ensure the authenticity of the experiment, I included my iPad® as "off limits." What a day.

 

Most of us are familiar with the five stages of grief. I experienced my own five stages. Anxiety, Liberation, Separation, Acceptance, Isolation. The last stage was the most interesting. I felt quite alone. Not the cool alone (givin' it to the Man!), but the sense of not being a part of societal norm.

 

Rules of society have now permeated technology. Just like crossing at a crosswalk, queuing up in a grocery store and parking in designated spaces, carrying a mobile device at all times is the norm and a near requirement of being a part of society.

 

Now that my unscientific experiment is over and my thesis concluded, I think the opportunity to maximize the potential upside of this for businesses of all sizes is ripe and ready. Everyone is talking about BYOD (Bring Your Own Device), but no one is capitalizing and investing in BYOD like VMware®. It appears to me that VMware has focused on three key facts:

 

Read more... 

  

New ESI Website  

 

ESI announced the launch of it their re-designed website on February 22, 2012. In addition to a fresh and dynamic new look, the updated site offers a simplified and streamlined way to discover how ESI products and services can help businesses thrive and grow.

 

Visitors will be able to easily find ESI systems and solutions that best match their business needs as well as access news, blog posts, and other items from ESI. In just a few clicks, site visitors can navigate to any ESI system, phone device, or application, and find a multitude of information like features and benefits, documentation, videos, and FAQs.

 


Some noteworthy changes to our Web site are:
  • A simplified contact form puts prospects in touch with ESI
  • The Systems tab gives site visitors quick access to any of ESI's systems, where they can read additional information about how ESI systems help customers manage their communications.
  • The Solutions tab lets customers see information about businesses similar to theirs -- vertical market information like Education, Automotive, Medical, and more is contained in this area of the site.
  • The Support tab provides quick access to documents, videos, FAQs for a specific system, phone device, or ESI application -- simply pick a device or system from the list.
  • The new Events section is where you can view all events that ESI is hosting or attending.

Take a tour of the new site today, visit www.esi-estech.com 

Find the Business Sensibility in Network Security
Stefanie Hoffman, Fortinet
Unified Threat Management

Basic business missions and strategies can wind up lost in the endless array of enterprise network security threats, new technologies and tons of changing products and solutions for protecting networks.

 

Deloitte principals Ted DeZabala and Irfan Saif, along with MIT research scientist George Westerman, wrote the article "Evolve or Fail," asking enterprises whether their security capabilities are evolving with their business strategies. As operating environments become more complex, vulnerabilities are harder to manage.

 

Increasing threat levels emphasize the importance of visualizing these three evolving environments as the source of elevated risk:

  • Business environment: Evolves with market conditions and
    client needs and gives rise to new business models, processes and work methods
  • IT environment: Evolves to support new models and changing expectations of users as they adopt new technologies and tools to conduct their work
  • Threat environment: Evolves as variable business and IT environments create new exposures, vulnerabilities and avenues of attack and adversaries become more creative and collaborative in uncovering these avenues of exploitation

Using this framework, the authors demonstrate why broad policies for technology governance, risk and compliance simply don't cut it anymore. A much closer look at the real risks and threats is needed, they say, to reveal a more holistic and clearer view that also takes into account, for instance, fiduciary and legal obligations.

 

Read more...

 

Click here to learn more about Unified Threat Management solutions from CCC Technologies, Inc. 
Archiving, Tape, D2D2T, and Olympic Gymnasts

Mark Campbell, Unitrends | Modern Backup 2 Blog 

Backup & Recovery

Recently there's been a great thread over at Spiceworks concerning Unitrends and tape.  When I say "great thread", I don't mean that the folks over there are saying that Unitrends is the greatest thing since sliced bread.  Actually - far from it.  The title of the thread is "Unitrends and Tape Archives (headaches.)"  I've been so busy that I simply missed the thread - and our resident Spiceworks forums guru Katie Drucker didn't tell me about it soon enough because obviously I've irritated her once too often.

 

All joking aside, what Tobyhe calls  out on this thread is that Unitrends doesn't support bar codes.  That makes it tough in his environment to auditing and recalling tapes.  He's right.  It's something we recognize that we need to do - and it's currently under development and schedule to beta and be released in Q2-2013 (best estimate beta in May or early June, committed generally released in late June.)  Anyone who is a current or future customer that wants to be included in the beta, please contact us at beta@unitrends.com.

 

There is something that was said later in the thread that I wanted to directly address - it was stated in a conversation among a few Spiceworks members.  It was noted that Unitrends prefers disk archiving over tape archiving.

 

This isn't our intent.  To put it simply, we aspire to be like Olympic gymnasts - we want to be flexible.


Read more...

 

Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.

Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
4 Keys to BYOD Success
By Tony Bradley - February 28, 2013 - CIO.com
Managed Services

PC World - We all love our gadgets, but some of our favorite devices, however innocent they may appear, are poised to overwhelm IT departments worldwide.

Like it or not, the "bring your own device," or BYOD, trend is now a permanent fixture among businesses big and small. Sure, some companies still prohibit employees from integrating personal laptops, tablets, and smartphones into their IT infrastructures, but their numbers are quickly dwindling. BYOD is a matter of "when" not "if," so businesses and IT admins must understand the risks involved and determine the most effective and secure ways to embrace all these alien gadgets.

 
When Paul Proctor, vice president and security analyst for Gartner, moderated a panel discussion on BYOD at the RSA Security conference in San Francisco this week, he classified four different approaches to BYOD: containerization, embrace, block, and ignore.

 

 Read more...