Published on : December 20, 2016 by Sreenivas M
When one hears about phishing in websites they know that something fishy is going on with it. For all of those who doesn’t know about phishing, you may want to look into this. What is phishing and why one should be concerned about it? Phishing is a way of getting sensitive information such as usernames, passwords, […]
Published on : December 12, 2016 by Siju Jacob
In Part 1 of the article, Bitcoin Introduction, we discussed how to send and receive Bitcoins. If you skipped or would like to read it again, you can find it here Once Bitcoin transaction is propagated on the bitcoin network, it does not become part of the shared ledger (the blockchain) until it is verified and […]
Published on : August 13, 2016 by Maddy Mattocks
As a part of our remote infrastructure management services, while trying to configure a Juniper Series (JunOS which is based on FreeBSD) you may get an error saying a similar message to below This is because you may have an SSH connection which could have disconnected while in the configuration mode. You can disconnect the […]
Published on : July 20, 2016 by Sanjeev Jacob
We have been discussing about how to interact with the customer and help him in an effective way in the previous posts ( Part-1 , Part -2 , Part -3 ). Being humans, we have our own set of limitations and are prone to make mistakes. If you keep a dump ear to your critics, […]
Published on : July 18, 2016 by Sanjeev Jacob
Once you started working on the issues, you may encounter situations which can’t be handled by your technical skills alone. The client might have some emotional/sentimental reasons for a particular issue and where you should showcase your skills in responsive customer support to make the client comfortable. Even though the client’s demand is beyond your […]