Cisco Blogs


Cisco Blog > Small Business

My People Don’t Understand Our Applications

Guest Post by Contributing Author Ken Presti

Scenario #1:

“I put it in the system. Really, I did.”

“Then where is it?”

“Umm….”

Scenario #2:

“Help! I can’t figure out how to do that.”

“It’s right here. Just look in this drop down menu.”

(Wait 5 minutes)

“Help! How do you do the other thing?”

“It’s right here in the other drop down menu. Just take a moment to look around. It’s not hard to figure out. Just look for a couple of minutes.”

(Wait 3 minutes)

“Help….”

Read More »

Tags: , ,

Digital Britain: Creative and Tech Talent Landscape

July 12, 2011 at 1:30 am PST

Right in the middle of Shoreditch, and a landmark for the Silicon Roundabout community, TechHub has turned one year old.  With the captivating Elizabeth Varley and the Helm, supported by Mike Butcher and Mike Marcus (plus many others), TechHub is ready to celebrate its second year of operations.

I attended part of their celebrations this past week, and I was most definitely filled with a refreshing optimism for the future of this blossoming tech cluster within the East End of London.

Read More »

Tags: , , , ,

3 Steps for Preparing Your Network for IPv6

IPv6 is coming—are you ready to make the transition?

The next generation of Internet networking protocol—IPv6—is coming and companies of all sizes are preparing their networks for it now. IPv6 makes room for more people, more companies, and more devices on the Internet than the current Internet protocol, IPv4.  IPv6 provides better security, faster performance over virtual private networks (VPN), and makes local networks easier to manage. The new protocol also offers improved quality of service (QoS) for more reliable voice and video performance and ensures better coverage and throughput for mobile devices.

Read More »

Tags: , , , ,

The Lone Admin and The Cisco Technical Support iPad App

Authored by : Kent Wong, Product Manager, Technical Services

It was a evening like any other.  The Lone Admin walks into a his local watering hole to relax after a full day of battling issues and keeping his company’s network safe and secure.  He is known somewhat as a miracle worker, a conundrum wrapped in an enigma.  Even against the most sinister of network issues he is able to stand his ground and find resolution all by himself.  How does he do it?  None of his peers know.

Read More »

Tags: , , , , , , , , , , , , , , , ,

What’s Considered “Acceptable Use” For Your Small Business?

Creating an acceptable use policy establishes rules for everyone using the company network

All small companies need an acceptable use policy (AUP). An integral part of any company’s network security program, an AUP is a set of rules that describes how everyone may use the company’s network and network resources, including the Internet. An AUP also spells out the consequences for not following these rules. With an AUP in place, you can protect your company from dangerous behavior online and hold those responsible for their actions. It’s relatively easy to create an acceptable use policy. To be truly useful, though, it must be tailored to your company’s specific needs and business operations.

Read More »

Tags: , ,