Feeds

Bulldog targets SMEs

Your business in their hands

Boost IT visibility and business value

Bulldog - the local loop unbundling (LLU) ISP owned by Cable & Wireless (C&W) - has set up a new division to flog its broadband service to business users.

According to the blurb, Bulldog's aim is to "meet the specific needs of different small businesses, whilst still retaining at its core the four values of: simplicity, support, flexibility and value for money".

Carlo Soresina, sales and marketing director of Bulldog, is to head the new business division.

"Bulldog understands that small businesses don't just need the newest, fastest or cheapest solution - what they need is something that, simply, affordably and reliably, supports their business," he said in a statement.

Which is all well and good. But El Reg would like to know what assurances Bulldog can give that business customers - who would rely on their broadband and phone service for their livelihoods - would be spared the kind of cock-up that hit the ISP in the summer and led to a formal investigation by telecoms regulator Ofcom?

And if SMEs are hit, what measures has Bulldog put in place to ensure that their service is restored in double quick time without the kind of debacle that tarnished Bulldog's reputation earlier this year?

A spokesman for Bulldog told us: "We fully understand how critical broadband and voice services are to businesses, and we've built a dedicated business support offering to meet their requirements.

"Bulldog now has 300 call centre staff, up from the 50 that we had when we had issues earlier in the year. Calls to our business support teams are answered within a minute, and our support is available from 8am to 8pm daily, six days a week.

"We're continually working to improve this offering; with the communications infrastructure at the heart of most modern businesses, its absolutely crucial to be able to access support offerings when needed." ®

The essential guide to IT transformation

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.