Quick Links to CCC...
Solutions
|
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.
|
NPS® Update
Current NPS®: 82.77% Surveys Completed: 1002
Click here to learn more about Net Promoter Score. |
Trivia
Trivia Answer
Bud Abbot and Lou Costello, playing out-of-work comedians seeking employment, lived at the Fields Rooming House at 214 Brookline Avenue. How much a week did they pay in rent?
ANSWER: Seven dollars
WINNERS: Dan Kurkiewicz _________________ New Trivia "Time to twist our Mousekedial to the right and the left with a great big smile. This is the way we get to see a Mouse Cartoon for you and me."
Finish the line that would open the Mickey Mouse Treasure Mine.
|
|
|
|
Ask the Expert "Archiving Emails in Outlook 2010"
George Kalfas, ConvergeSecure® Engineer
Email has become a critical part of both our personal and professional lives. Properly archiving those messages so that you can free up space and still be able to access them at a later date is just as important.
In this article I will cover the necessary steps to setup archiving of your Outlook 2010 mailbox. I will review how to manually archive, archive by date, and auto archiving.
This example uses Microsoft Outlook Version 2010 but you can set up archiving in any version of Outlook. The steps below should guide you, however, some of your windows and options might be slightly different. Read more...
|
"Protecting the Network in a BYOD Environment" Join us on the Web April 24, 2013 | 1-2pm CST
Rob Ayoub, Fortinet

As smartphones and tablets multiply in the workplace, do you know the best way to take advantage of these devices while retaining control of your network? Are you protecting your network from the threats these devices may introduce while still ensuring productivity?
BYOD is a top concern for many organizations today - employees see the ability to improve work-life balance and organizations hope to realize productivity gains. However, none of these can be accomplished without security at the network layer.
For more information and to register
NOTE: Even if you will not be available to join us at the scheduled time, it is still recommended that you register so that you receive a link to the recorded session to review at your convenience.
|
How are you documenting calls today?
Rob Ayoub, Fortinet
Organizations in nearly every industry conducting all or part of their business by telephone are faced with a complex web of legal, industry and service-level compliance guidelines. OAISYS provides the most comprehensive solution for voice compliance, offering an extensive array of exclusive features and functionality to meet specific business needs and requirements.
Watch the video below to learn more about OAISYS...
|
CCC "Jumble" - April Edition
The votes are in and the new Jumble will continue to be a fixture in our monthly newsletters. Congratulations to our March Winners:Jan Niehart Sheila Jaycox Jumble winners receive a Starbucks Gift card. Here is this month's jumble. Click the picture below to download. Completed entries should be emailed to Kim Kiefer at kkiefer@ccc1.comGOOD LUCK! The answers to the March Jumble can be found below.
|
*AVAYA USERS* Attending IAUG CONVERGE 2013? Get more info here
Join thousands of Avaya users from around the world at the International Avaya Users Group (IAUG) CONVERGE2013 happening June 3-7 in Orlando, FL. No other conference brings people from every corner of the Avaya ecosystem to one place. Secure your attendance by registering today and save $100 off the current member registration price using discount code AVAYA.
At the 2013 event, you'll find:
- An inside look at Avaya's products and plans from the Avaya executive leadership team, including President & CEO, Kevin Kennedy.
- Over 200 cutting-edge education sessions providing comprehensive learning through panel discussions, roundtable conversations, case studies and hands-on workshops.
- Peer-to-peer collaboration and one-on-one meeting opportunities with Avaya representatives
- More than 130 of the industry's leading solution providers showcasing innovative products and services at the Solutions Expo.
Flexible registration packages are available to accommodate a variety of schedules and budgets including bundled registration - which provides one easy step for registering and securing your stay.
IAUG members receive more than $200 in savings by registering on or before April 17, 2013. Not a member? As a valued Avaya customer I would like to offer you this exclusive introductory discount of 50% off your first year of membership! Simply use code IAUG2013 when joining.
See you in Orlando!
|
Whether it is for in-house use or service provisioning, the benefits of the cloud are the same - economies of scale, greater productivity, and easier access to ongoing technology advances.
What makes Mitel's Cloud Communications Strategy unique? In a word: flexibility.
Mitel recognizes that the cloud is not a one-size-fits-all proposition for our customers. That is why we deliver cloud-ready software that can be deployed using private, public, and hybrid cloud architectures. Most unified communications needs generally include traditional premises deployment and the cloud, so giving our customers the flexibility to move from one model to another as their business needs change is important. We think giving our customers that flexibility is what sets us apart.
Each cloud model has its own strengths, so being familiar with characteristics of each model is important when working with Mitel to shape the right cloud strategy for your organization. Here are some of their characteristics in a nutshell:
Read more...
|
Security 101: Two-Factor Authentication
Richard Henderson, Fortinet
 Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches. Simply having a login name and a password, even a strong password - one that doesn't contain words from the dictionary, and consists of upper case letters, lower case letters, numbers, and special symbols like exclamation points, ampersands or other non-alphanumeric characters - is often no longer strong enough to prevent a breach. You could have an incredibly strong password, but if the system that stores that password doesn't secure it properly, the password is no more effective in protecting your account as using the word 'password'. Systems can store passwords in many different ways, in order of 'strength' from weakest to strongest: as plain text, as the output of a basic encryption method known as a one-way hash, adding a unique string to each password and encrypting that (known as a salted hash), or stretching a hash (a method of encrypting the output of an encrypted output of an encrypted output). Read more... View Fortinet's Live Threat Monitor Click here to learn more about Unified Threat Management solutions from CCC Technologies, Inc.
|
Shrink-Wrapped Enterprise-Class Data Protection
Mark Campbell, Unitrends | Modern Backup 2 Blog
Our offerings, whether physical or virtual appliances, enable you to protect complex environments quickly and simply. In short, at Unitrends it's our goal to offer shrink-wrapped enterprise-class data protection.
It's a whole lot easier to say this than to do it.
Enterprise-class data protection means that we're agile in terms of adapting to a customer's environment. This agility means that we support the heterogeneous environments of our customers with a single solution. However, the desire to offer lower complexity (the "shrink-wrapped" piece of this) is often at odds with this kind of adaptability.
We saw this in 2012 with one of the major backup companies that eliminated features and functions of its backup product and faced a huge customer backlash. The trouble with what they did was not realizing that many of its customers want their data protection product to handle heterogeneous complexity while at the same time being as easy to use and simple as feasible (but not simpler!).
Read more... Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
|
5 Misconceptions of Cloud Software and Virtual Licensing
By Thor Olavsrud - April 4, 2013 - CIO.com
If you've been busy virtualizing your environment, or migrating to an internal cloud, chances are your software licensing and maintenance costs are spiraling out of control.
Every CIO wants to balance costs and maximize efficiency, but the shift to virtual and cloud hosting models has changed the game when it comes to software licensing, and many IT organizations are playing under old rules that no longer apply. "Traditionally, asset management has been responsible for a lot of these costs and the operational groups were less concerned about it," says Andrew Hillier, CTO and co-founder of Richmond Hill, Ontario-based CiRBA, a specialist in capacity transformation and control systems for virtual and cloud infrastructure. "But if you're building an internal cloud, all of a sudden this becomes your problem."
Read more... |
|
|
|