My Profile   |   Contact Us   |   Sign In   |   Register
News & Press: Corporate Partner News

May 2015: AT&T Small Business Highlights

Thursday, May 14, 2015  
Share |



Yvette Pugh, headshot

Yvette Pugh

Hi everyone,


I am particularly excited to share this iteration of the AT&T Small Business eNewsletter with you on the heels ofNational Small Business Week. Every year during this important week, we celebrate today’s entrepreneurs, recognize the hard work put into the operation of small businesses, and discuss resources for shared success.


At AT&T, we’re committed to the success of small businesses. While using the best mobile technology provided by AT&T is more important than ever, we also want to help by providing resources and education above and beyond products and services:



bullet pointBusiness Circleis designed to help small businesses interact with — and learn from — each other. While providing tips and tools to small business owners, Business Circle also enables them to connect and engage with their community, experts, vendors, partners and even potential customers.


bullet pointWe also developed a free online portal —Safeguard Your Business— to help small businesses prepare for and manage the impact of both natural and manmade disasters.


Please don’t hesitate to reach out with any questions or comments. My door is always open.








Dream Big. Start Small.


This blog was authored by Cathy Martine, AT&T President of Enterprise Solutions.


As we wrap upNational Small Business Weekwe’ve been able to celebrate America’s entrepreneurs who dream big and start small. The Small Business Association honored the people that live and breathe their small businesses or startups by holding events and giving awards across the nation. At AT&T, we did our own celebrating by sharing daily promotions, marketing and communications to our new and existing AT&T small business customers. Have you seen AT&T Business Circle? Check it outhereto explore, learn and connect with national business owners.



Whether you support our small business customers, local small businesses in your community, or know a small business owner or entrepreneur, I encourage all of you toget involved and support your favorite local business. Our Small Business focused employees make every week small business week!





How Do You Keep Pace With a 100,000 Percent Increase in Wireless Data Traffic?


This piece by John Donovan, Senior Executive Vice President — AT&T Technology and Operations, originally appeared on theAT&T Innovation Space Blogon March 2.


Imagine driving your car 60 miles per hour on the highway. A good clip, but sustainable. Your car was built for this. Now imagine stomping on the gas and accelerating to 60,000 miles per hour. Your car was, needless to say, not built for this.


Well, in the last eight years, data traffic on our wireless network has increased at just that rate,a staggering 100,000 percent, driven primarily by video. We’re asking a network model designed years ago for modest and predictable increases in voice traffic to adapt to a world of streaming videos, high-definition games and photo-intensive social media.


We’ve been able to keep up with the increase by using more and more sophisticated, complex routers, switches and other gear. But this just isn’t feasible for much longer. It’s too slow, too inefficient and too expensive.


AtAT&T, we have found a better way. As I announced last year atMobile World Congressand updateda few months ago, it’s a model developed in the IT world, where you emulate the functions of those complex pieces of hardware with software, and run that software on standard, off-the-shelf hardware. You canadd capacity faster and push out upgrades at the speed of the Internet.While the technology enabling this transition is intricate, it’s a process we’ve all mastered in our personal lives. Think about how the apps on your smartphone —games, music players, video streaming services, fitness trackers —have replaced many of the separate physical devices we used to need.


That’s the model for our next-generation network, powered by technologies, including software-defined networking (SDN) and network function virtualization (NFV).By 2020, we plan to virtualize and control over 75 percent of our network using this new software-defined architecture to meet the growing demands of data and video-hungry users.


Read morehere.


Click to watch the 'Explore the Possibilities of the Software Defined Network' video






Live Event Q&A: How to Convert Customers and Drive Sales on your Website


Tune in toAT&T Business CircleonFriday, May 22 at 1 p.m. ETfor a live event Q&A withJason Goldberg, vice president of commerce strategy for Razorfish.


Jason will help you learn how to turn your website traffic into valuable customer experiences that drive sales. Log inhere!






How to Avoid a Security Apocalypse


This article byInc.originally appeared in theAT&T Business Circleon April 17.


Use these 5 powerful weapons to prevent viruses, malware, security breaches, lost data


There was a time when “protecting your business” mostly entailed a lock and key —and maybe a loud alarm.These days, with so much of your business reliant on technology, security has less to do with doors than with firewalls and the many other components of network infrastructure and mobile connectivity.There are viruses and malware to avoid, potential disruptions to prepare for, cyber attacks to thwart, and even internal threats resulting from accidents or omissions — such as when your staff inadvertently disseminates private data or allows improper access to your network.


Today, we’ll discuss the pieces ofa comprehensive security solution— a plan that takes internal and external factors into account, laying out a blueprint for protecting your business from the wide range of threats it faces. Here are five key points to consider when securing your assets:


bullet pointViruses and malware.These infections not only harm your system but can also hijack your data, often while displaying no symptoms whatsoever.


bullet pointCyber attacks.Even small businesses fall prey to hackers. Smaller retailers, for example, often have fewer security measures in place. This makes their customers’ payment card information just the kind of low-hanging fruit attackers are looking for.


bullet pointDisaster recovery.Not all attacks are malicious — unless you regard Mother Nature as having a nasty temperament. Severe weather and other disasters (including human error) can take you offline, destroy data and damage your facilities.


bullet pointMobility.Endpoint security is crucial in our increasingly mobile workforce. Every device that connects to your network should be held to specific security standards — a particular operating system, software updates or restrictions on installed apps.


bullet pointThe human factor.We make thoughtful hires and guide new employees through well-designed orientation programs, but security procedures are often an afterthought, if any exist at all.


Read more in-depthhere.



more Calendar

ChallengeHER Austin

Give Me 5: Executing Your Plan to Add Zero to Your Revenues (Part 2)

Give Me 5: Executing Your Plan to Add A Zero to Your Revenues (Virtual Mentoring)

Give Me 5 Virtual Mentoring: DCAA Audit Readiness

Give Me 5: Life After 8a

Featured Members
Pamela MazzaWIPP National Partner

Privacy Policy / Disclaimer    |    © WIPP  |    888-488-WIPP

Association Management Software Powered by YourMembership  ::  Legal