As so many others, I keep abreast of openings in my field, and apply when I see something relevant and interesting with an employer I might want to work for. These are my experiences with three such applications and the recruiters managing them (all of which, I might add, were external to the company recruiting for the position).
Thoughts on many things Posts
As a tech support specialist, I often have to guide the end user through basic troubleshooting, and this often resolves the issue. I’ve told this story before, but it bears repeating, in particular because it reinforces the lesson.
A couple of weeks ago, the excellent @IanColdwater posted the following:
Having worked in tech support for fifteen years, I find I still enjoy my work. Yes, at times, I feel like a target at a live fire exercise, but at the end of the day, I still find fulfillment in knowing that I am able to help my users. Here are five tips to giving better tech support:
One issue I meet from time to time, is the fact that many of my users do not understand how to approach tech support in a way that is conducive to receive good support in a timely manner. While this list is in no way exhaustive, following the tips and tricks will get you slack when you need it.
Improvise, adapt, overcome has for a long time been a mantra within armed forces around the world who, when faced with gruelling challenges and little or no epuipment, have improvised to face the challenge, adapted to the challenge and lastly overcome the challenge.
Over the past couple of weeks, a story has been breaking that video conferencing vendor Zoom leaves a back door on your Mac when uninstalling it, which will let them run their service and reinstall that much quicker in the future. For details, I recommend this Medium article.
I could have sworn I wrote about this years ago. When I looked for it the other day, however, I couldn’t find it, so here goes. I love the fact that Google Chrome has combined the search and address bars into one cohesive unit. While it does, on occasion, mean that I search when I mean to enter an address, that is preferable to having that piece of monitor real estate split into two.
As has been the case so many times before, this week I’m bringing you the direct result of a customer request. The customer in question needed to know how to run a .ps1 script. As you may or may not know, double-clicking the script defaults to editing the script. At any rate, here’s how you do it:
Email has long been a vector for more or less targeted attacks such as virus attacks, phishing, and spearphising. In my years of working in IT, I have seen a number of examples of this, including one which in effect took down most of the fileshare in a corporate environment for as much as a week while we were restoring from backup.