Quick Links to CCC...
Solutions
|
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.
|
Trivia
TRIVIA ANSWER:
Fantasy Island was, of course, totally surrounded by water, in which lived many strange creatures. It was known, for example, that a mermaid called these waters home. Michelle Phillips played the role.
What was her name?
ANSWER:
Princess Nyah
WINNERS: Dan Kurkiewicz _________________
NEW TRIVIA
1975 was the year Bruce Springsteen had his first hit single. What was the name of the song?
|
|
|
|
Ask the Expert: Voicemail Gets No Respect
Tom Calandriello, ConvergeAssure® Engineer
 In our NOC, it seems that not a day goes by that we don't handle a voicemail issue. They come in different degrees of difficulty: a.)I forgot my password; b.) how do I create a new mailbox; c.) I need to change my greeting; and d.) My voicemail system is DOWN.
Over time, our messaging technology has evolved well beyond the basic voicemail message. Today we rely on emails ( prime example - Hilary Clinton ) and text messaging. We even have voicemail to email as a time saving feature. Bottom-line, voicemail gets no respect. Society today takes voicemail for granted.
So, I thought this might be a good time for all of us to gain a greater appreciation for this remarkable technology that actually goes hand-in-hand with one of the greatest inventions in the past century and a half - the Telephone.
Read more...
|
RSVP NOW For Our July 28th Event! Learn the Latest About Fortinet's Advanced Threat Protection Framework (and Golf Too!)

Fortinet and CCC Technologies cordially invite you for a stimulating discussion on real-world insights around strengthening network visibility and security while enjoying an afternoon of golf, drinks and appetizers at TopGolf.
We continue to see a steady stream of high profile data breaches, generally from cyber-attacks deceiving and evading legacy security solutions. As these attacks become more advanced, organizations must similarly improve their security posture.
Fortinet's Advanced Threat Protection Framework delivers end-to-end protection across the attack chain, for security without compromise. Please join us to learn more about how we can protect your organization. Space is limited- please register today!
Location
TopGolf 699 W. Thorndale Ave. Wood Dale, IL 60191
Agenda
12:30pm-1:00pm - Registration1:00pm-2:00pm - Presentation 2:00pm-2:30pm - TopGolf instruction/Drinks & Appetizers Served 3:00pm-5:00pm - TopGolf Enjoy TopGolf
Top Golf is the premier golf entertainment complex where the competition of sport meets your favorite local hangout. Just picture a 240-yard outfield with dartboard-like targets in the ground. The closer to the center or "bulls-eye" you get and the farther out you hit your microchipped balls, the more points you receive.
|
Congratulations Danny and Karla!!!! Welcome to the Family Harrison James Poull!
We are overjoyed to announce the arrival of our newest member to the CCC Technologies family, Harrison James Poull. Harrison was born at 7:41pm on July 5th, weighing 8lbs 14oz and measuring 21.5 inches long. Mom Karla and baby Harrison are both doing very well and baby Harrison has already had his first professional photo shoot. We are also happy to report that new dad, Danny, has already mastered diaper changes and has Harrison off to a great start in his White Sox gear to celebrate the All Star game. Welcome to the world Harrison and to the CCC Family :)
|
Multiple Supplier Options
When it comes to telecom we know you have many choices. So many, in fact, it is sometimes hard to identify the best fit.
As a telecom broker/agent we work with many suppliers. In fact, we have a portfolio including over 70 carriers. As such, there are a few advantages we may have over a direct rep or carrier:
- We are involved in the sales process, provisioning process, and post-sales support. That means we have a perspective most direct reps don't have, for all carriers across the board.
- Being an agent with multiple carriers also allows us to focus on a solution, not just a product. If a particular supplier doesn't have the product we feel best fits your needs, we move to the next. We won't sell you something that isn't in your best interest.
- We give you options! Several carriers may carry the same types of services, however they aren't always created equal. We can present the carriers we see the most success with, and offer multiple pricing options. We can also consult and give expert advice. Sometimes price is the most important, sometimes it's the service. We will make sure you are aware of the pros and cons of all the options.
If you would like to see what's available in your area, contact your CCC Technologies' Representativel. We have access to the most up-to-date carrier fiber maps and can provide real-time quoting to you.
|
Your Own Personal Assistant? It All Adds Up!
Savio Tovar Dias, Avaya
 If you're a highly paid CEO of a large multinational, then you probably already have a personal assistant taking care of your life, so you won't need to read any further. If you're not-and let's face it you almost certainly aren't-then imagine what life would be like if you did have such a personal assistant, your very own Jarvis.
For those who haven' seen the Iron Man movies-also highly unlikely-Jarvis is Tony Stark's artificial intelligence personal assistant. Jarvis takes over Tony's life; there is really nothing Iron Man can do if Jarvis is down. Soon though we might all get the feeling of having a Jarvis of our own-and that's because of companies wanting to achieve higher customer satisfaction (CSAT) scores.
Read more...
|
DEMO: Mitel MiContact Center Business - IT Administrator
|
Fortinet Q&A with Mark Byers How Secure Are Your Company's Applications?
John Welton - Fortinet - June 28, 2016

Organizations of all types today face an ever evolving threatscape and growing pressure to rethink security strategies for long-term sustainability. Today's enterprises operate in a complex technological environment, with a variety of devices, applications, and users accessing the network. Fortinet's Mark Byers discusses the issues and trends affecting the security of enterprise applications.
What do companies need to know about security as it relates to their application infrastructure? When most companies think about cyber security, they think of their network. This is a great place to start-but it's not the whole picture. The question we need to ask is, what exactly needs to be secured, and why? At the end of the day, we're really talking about the need to secure data-whether it's customers' credit card data, health information, corporate financial data, employee information, proprietary information, etc. And that means we need to consider all the different access points that need to be secured. One of the weakest links is applications. You can have multiple layers of network security, but once you expose an application to the Internet, your network security is not enough. When a company provides users access to an online application with a user ID and password, that user and attackers now have access to the data that can potentially bypass many layers of carefully crafted security protections.
|
Axcient Blog: Taking a Closer Look at DRaaS
 This is the third of a 3 part series centered around analyzing the pro's and con's of a colocation centers versus a Disaster-Recovery-as-a-Service (DRaaS) and figuring out which is better.
Now that we have taken a look at the pro's and cons of both colocation centers and DRaaS providers, a simple question is raised: which one is better for my business?
Read more...
|
CIO How-To OK, Google: 160 Valuable Voice Commands for Andriod
JR Raphael | Computerworld | July 13, 2016
 This diverse collection of voice commands will turn your phone into a powerful personal concierge -- no tipping required.
Android has actually had a robust voice command system in place for ages -- and the number of things it can do for you is expanding all the time. In fact, Google may be preparing to unveil a newly rebranded and even more conversational version of its virtual assistant later this year, but you don't have to wait to start making the most of your mobile device's listening smarts. Below, we've listed 160 commands that are fully functional and ready to be used right now. We've put words and phrases that are examples in [brackets]; additional explanations are in (parentheses). And when you see a command with two words separated by a slash (e.g., "Enable/disable battery saver mode"), you know to say just one or the other of the words, right? Thought so. Read more...
|
|
|
|