SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Technical Support

PC Repair and Troubleshooting
Technical Support
• refers to a range of services by which enterprises
  provide assistance to users of technology
  products
   – Mobiles
   – Computers
   – Software
• attempt to help the user solve specific problems
  with a product
• Via SMS, chat, email, phone, fax, forum, website,
  or remote access
Remote PC Repair
• method for troubleshooting software related problems
  via remote desktop connections
• Technicians use software that allows the technician to
  access the user's desktop via the Internet.
• With the user's permission, the technician can take
  control of the user's mouse and keyboard, transfer
  various diagnostic and repair applications to the user's
  desktop, run scans, install antivirus programs, etc.
• If the remote service permits it, the technician can
  even reboot the PC and reconnect remotely to
  continue his work without the user needing to assist.
Technical Support Common Activities
• installing and configuring computer hardware operating
  systems and applications;
• monitoring and maintaining computer systems and
  networks;
• talking staff/clients through a series of actions, either face
  to face or over the telephone;
• troubleshooting system and network problems and
  diagnosing and solving hardware/software faults;
• replacing parts as required;
• providing support, including procedural documentation;
• following diagrams and written instructions to repair a fault
  or set up a system;
• supporting the roll-out of new applications;
• setting up new users’ accounts and profiles and dealing
  with password issues;
• responding within agreed time limits to call-outs;
• working continuously on a task until completion (or referral
  to third parties, if appropriate);
• prioritising and managing many open cases at one time;
• rapidly establishing a good working relationship with
  customers and other professionals (e.g., software
  developers);
• testing and evaluating new technology;
• conducting electrical safety checks on computer equipment
Multi tiered technical support
• Technical support is often subdivided into tiers, or
  levels, in order to better serve a business or
  customer base
• The divisions of technicians is dependent on
   – the technicians’ understanding of their level of
     responsibility and commitments,
   – their customer response time commitments,
   – when to appropriately escalate an issue and to which
     level
• A common support structure revolves around a
  three-tiered technical support system
Tier 1 / Basic Support
• initial support level responsible for basic customer
  issues
• gather the customer’s information and to determine
  the customer’s issue by analysing the symptoms and
  figuring out the underlying problem
• Once identification of the underlying problem is
  established, the specialist can begin sorting through
  the possible solutions available using some kind of
  knowledge management tool
• 1st line support actually requires very good knowledge
  of the products, terms and conditions offered by the
  business rather than technical information itself
Tier 2 / Advance Support
• in-depth technical support level
• assists Tier I personnel solve basic technical problems
  and investigates elevated issues by confirming the
  validity of the problem and seeking for known
  solutions related to these more complex issues
• review the work order to see what has already been
  accomplished by the Tier I technician and how long the
  technician has been working with the particular
  customer
• If a problem is new and/or personnel from this group
  cannot determine a solution, they are responsible for
  raising this issue to the Tier III
Tier 3 / Expert Support
•   highest level of support in a three-tiered technical support model responsible for
    handling the most difficult or advanced problems
•   responsible for not only assisting both Tier I and Tier II personnel, but with the
    research and development of solutions to new or unknown issues
•   reviewing the work order and assessing the time already spent with the customer
    so that the work is prioritized and time management is sufficiently utilized
•   Upon encountering new problems; they must first determine if they can solve the
    problem and may require the customer’s contact information so that the
    technician can have adequate time to troubleshoot the issue and find a solution
•   an issue may be so problematic to the point where the product cannot be salvaged
    and must be replaced. Extreme problems are also sent to the original developers
    for in-depth analysis
•   If it is determined that a problem can be solved, this group is responsible for
    designing and developing one or more courses of action, evaluating each of these
    courses in a test case environment, and implementing the best solution to the
    problem. Once the solution is verified, it is delivered to the customer and made
    available for future troubleshooting and analysis.

Weitere ähnliche Inhalte

Was ist angesagt?

Maximum likelihood sequence detection with the viterbi algorithm
Maximum likelihood sequence detection with the viterbi algorithmMaximum likelihood sequence detection with the viterbi algorithm
Maximum likelihood sequence detection with the viterbi algorithmbajrang bansal
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx56ushodayareddy
 
GestiĂłn de incidentes
GestiĂłn de incidentesGestiĂłn de incidentes
GestiĂłn de incidentesjohnfer1234
 
Seguridad En Profundidad, Defense in Depth (DiD)
Seguridad En Profundidad, Defense in Depth (DiD)Seguridad En Profundidad, Defense in Depth (DiD)
Seguridad En Profundidad, Defense in Depth (DiD)Melvin JĂĄquez
 
Knowledge Representation.ppt
Knowledge Representation.pptKnowledge Representation.ppt
Knowledge Representation.pptssuserda4860
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Mesa de ayuda (Infografia)
Mesa de ayuda (Infografia)Mesa de ayuda (Infografia)
Mesa de ayuda (Infografia)Hassva Brito
 
Help desk por Mauro
Help desk por MauroHelp desk por Mauro
Help desk por MauroGrupaAE
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware AnalysisPrashant Gupta
 
Shannon code & shannon fano & huffman method - chapter three
Shannon code  & shannon fano & huffman method  - chapter threeShannon code  & shannon fano & huffman method  - chapter three
Shannon code & shannon fano & huffman method - chapter threeDrMohammed Qassim
 
Digital signal Processing all matlab code with Lab report
Digital signal Processing all matlab code with Lab report Digital signal Processing all matlab code with Lab report
Digital signal Processing all matlab code with Lab report Alamgir Hossain
 
Cyber security
Cyber securityCyber security
Cyber securityAnkush Verma
 
PresentaciĂłn mesa de ayuda WaveServices
PresentaciĂłn mesa de ayuda WaveServicesPresentaciĂłn mesa de ayuda WaveServices
PresentaciĂłn mesa de ayuda WaveServicesdaniel arellano
 
Protocolo de atenciĂłn help desk
Protocolo de atenciĂłn help deskProtocolo de atenciĂłn help desk
Protocolo de atenciĂłn help desknaslibermudez
 
Business continuity & Disaster recovery planing
Business continuity & Disaster recovery planingBusiness continuity & Disaster recovery planing
Business continuity & Disaster recovery planingHanaysha
 
Mecanismos de Seguridad En InformĂĄtica
Mecanismos de Seguridad En InformĂĄticaMecanismos de Seguridad En InformĂĄtica
Mecanismos de Seguridad En InformĂĄticaJunior RincĂłn
 

Was ist angesagt? (20)

Maximum likelihood sequence detection with the viterbi algorithm
Maximum likelihood sequence detection with the viterbi algorithmMaximum likelihood sequence detection with the viterbi algorithm
Maximum likelihood sequence detection with the viterbi algorithm
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Lec am modulation
Lec am modulationLec am modulation
Lec am modulation
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
GestiĂłn de incidentes
GestiĂłn de incidentesGestiĂłn de incidentes
GestiĂłn de incidentes
 
Seguridad En Profundidad, Defense in Depth (DiD)
Seguridad En Profundidad, Defense in Depth (DiD)Seguridad En Profundidad, Defense in Depth (DiD)
Seguridad En Profundidad, Defense in Depth (DiD)
 
Knowledge Representation.ppt
Knowledge Representation.pptKnowledge Representation.ppt
Knowledge Representation.ppt
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Mesa de ayuda (Infografia)
Mesa de ayuda (Infografia)Mesa de ayuda (Infografia)
Mesa de ayuda (Infografia)
 
Help desk por Mauro
Help desk por MauroHelp desk por Mauro
Help desk por Mauro
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Shannon code & shannon fano & huffman method - chapter three
Shannon code  & shannon fano & huffman method  - chapter threeShannon code  & shannon fano & huffman method  - chapter three
Shannon code & shannon fano & huffman method - chapter three
 
Digital signal Processing all matlab code with Lab report
Digital signal Processing all matlab code with Lab report Digital signal Processing all matlab code with Lab report
Digital signal Processing all matlab code with Lab report
 
Cyber security
Cyber securityCyber security
Cyber security
 
PresentaciĂłn mesa de ayuda WaveServices
PresentaciĂłn mesa de ayuda WaveServicesPresentaciĂłn mesa de ayuda WaveServices
PresentaciĂłn mesa de ayuda WaveServices
 
Protocolo de atenciĂłn help desk
Protocolo de atenciĂłn help deskProtocolo de atenciĂłn help desk
Protocolo de atenciĂłn help desk
 
quantization
quantizationquantization
quantization
 
Business continuity & Disaster recovery planing
Business continuity & Disaster recovery planingBusiness continuity & Disaster recovery planing
Business continuity & Disaster recovery planing
 
1 PCM & Encoding
1  PCM & Encoding1  PCM & Encoding
1 PCM & Encoding
 
Mecanismos de Seguridad En InformĂĄtica
Mecanismos de Seguridad En InformĂĄticaMecanismos de Seguridad En InformĂĄtica
Mecanismos de Seguridad En InformĂĄtica
 

Andere mochten auch

Tech Tools for Writing and Organization
Tech Tools for Writing and OrganizationTech Tools for Writing and Organization
Tech Tools for Writing and OrganizationShawn Tran
 
Case Study: Providing Full Support Services to a Small Biotech Organization
Case Study: Providing Full Support Services to a Small Biotech OrganizationCase Study: Providing Full Support Services to a Small Biotech Organization
Case Study: Providing Full Support Services to a Small Biotech OrganizationKevin Shea
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service DeskWahyu Primadi
 
Introduction to AWS Enterprise Support
Introduction to AWS Enterprise SupportIntroduction to AWS Enterprise Support
Introduction to AWS Enterprise SupportAmazon Web Services
 
The Amazon Web Services support
The Amazon Web Services supportThe Amazon Web Services support
The Amazon Web Services supportSimone Brunozzi
 
Case study: Amazon improvement of customer service
Case study: Amazon improvement of customer serviceCase study: Amazon improvement of customer service
Case study: Amazon improvement of customer serviceSulaman Muhammad
 
Help Desk Presentation 09202009
Help Desk Presentation 09202009Help Desk Presentation 09202009
Help Desk Presentation 09202009guest75acf2
 
Organizational Structure
Organizational StructureOrganizational Structure
Organizational StructureAmmar Faruki
 
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...Amazon Web Services
 
Offshore Structures Presentation
Offshore Structures PresentationOffshore Structures Presentation
Offshore Structures Presentationsurya3303
 

Andere mochten auch (11)

4 pc repair
4 pc repair4 pc repair
4 pc repair
 
Tech Tools for Writing and Organization
Tech Tools for Writing and OrganizationTech Tools for Writing and Organization
Tech Tools for Writing and Organization
 
Case Study: Providing Full Support Services to a Small Biotech Organization
Case Study: Providing Full Support Services to a Small Biotech OrganizationCase Study: Providing Full Support Services to a Small Biotech Organization
Case Study: Providing Full Support Services to a Small Biotech Organization
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
 
Introduction to AWS Enterprise Support
Introduction to AWS Enterprise SupportIntroduction to AWS Enterprise Support
Introduction to AWS Enterprise Support
 
The Amazon Web Services support
The Amazon Web Services supportThe Amazon Web Services support
The Amazon Web Services support
 
Case study: Amazon improvement of customer service
Case study: Amazon improvement of customer serviceCase study: Amazon improvement of customer service
Case study: Amazon improvement of customer service
 
Help Desk Presentation 09202009
Help Desk Presentation 09202009Help Desk Presentation 09202009
Help Desk Presentation 09202009
 
Organizational Structure
Organizational StructureOrganizational Structure
Organizational Structure
 
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...
AWS Summit 2013 | India - AWS Support - Optimizing your Costs and Infrastruct...
 
Offshore Structures Presentation
Offshore Structures PresentationOffshore Structures Presentation
Offshore Structures Presentation
 

Ähnlich wie 9 technical support

Technical Architecture.pptx
Technical Architecture.pptxTechnical Architecture.pptx
Technical Architecture.pptxAubreyAppegu
 
An overview of the process for handling enterprise client tickets
An overview of the process for handling enterprise client ticketsAn overview of the process for handling enterprise client tickets
An overview of the process for handling enterprise client ticketsMohammad Ali
 
Engineer, Senior Systems IT
Engineer, Senior Systems ITEngineer, Senior Systems IT
Engineer, Senior Systems ITBradley Amm
 
Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk supportGera Paulos
 
provide1923.pptx
provide1923.pptxprovide1923.pptx
provide1923.pptxTadeseBeyene
 
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016Kim Correa
 
Michael Muellers Resume
Michael Muellers ResumeMichael Muellers Resume
Michael Muellers Resumemlm_330
 
Operation Research VS Software Engineering
Operation Research VS Software EngineeringOperation Research VS Software Engineering
Operation Research VS Software EngineeringMuthuganesh S
 
#speakgeek - Support Processes for iconnect360
#speakgeek - Support Processes for iconnect360#speakgeek - Support Processes for iconnect360
#speakgeek - Support Processes for iconnect360Derek Chan
 
Dropbox Support Specialist Phone Number.pdf
Dropbox Support Specialist Phone Number.pdfDropbox Support Specialist Phone Number.pdf
Dropbox Support Specialist Phone Number.pdfHPCustomerSupport
 
Help_Desk_System Presentation Overview
Help_Desk_System Presentation Overview Help_Desk_System Presentation Overview
Help_Desk_System Presentation Overview Leon Blum
 
Amberly Buckner Resume 2
Amberly Buckner Resume 2Amberly Buckner Resume 2
Amberly Buckner Resume 2Amberly Buckner
 
CV -linked in
CV -linked inCV -linked in
CV -linked inDevon Ford
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and designPreeti Mishra
 
WSC2015_WSSS39_IT_Network_Systems_Administration
WSC2015_WSSS39_IT_Network_Systems_AdministrationWSC2015_WSSS39_IT_Network_Systems_Administration
WSC2015_WSSS39_IT_Network_Systems_AdministrationMohammad Sadegh Khatibpour
 
Designing the expert system
Designing the expert systemDesigning the expert system
Designing the expert systemasimnawaz54
 
Sreedhar CV_PKI - Certificate Management
Sreedhar CV_PKI - Certificate Management Sreedhar CV_PKI - Certificate Management
Sreedhar CV_PKI - Certificate Management Sreedhar Roddam
 

Ähnlich wie 9 technical support (20)

Technical Architecture.pptx
Technical Architecture.pptxTechnical Architecture.pptx
Technical Architecture.pptx
 
An overview of the process for handling enterprise client tickets
An overview of the process for handling enterprise client ticketsAn overview of the process for handling enterprise client tickets
An overview of the process for handling enterprise client tickets
 
Engineer, Senior Systems IT
Engineer, Senior Systems ITEngineer, Senior Systems IT
Engineer, Senior Systems IT
 
Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk support
 
10 Benefits of Remote IT Support.pptx
10 Benefits of Remote IT Support.pptx10 Benefits of Remote IT Support.pptx
10 Benefits of Remote IT Support.pptx
 
provide1923.pptx
provide1923.pptxprovide1923.pptx
provide1923.pptx
 
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016
 
ISTQB foundation level - day 2
ISTQB foundation level - day 2ISTQB foundation level - day 2
ISTQB foundation level - day 2
 
Michael Muellers Resume
Michael Muellers ResumeMichael Muellers Resume
Michael Muellers Resume
 
Operation Research VS Software Engineering
Operation Research VS Software EngineeringOperation Research VS Software Engineering
Operation Research VS Software Engineering
 
#speakgeek - Support Processes for iconnect360
#speakgeek - Support Processes for iconnect360#speakgeek - Support Processes for iconnect360
#speakgeek - Support Processes for iconnect360
 
Dropbox Support Specialist Phone Number.pdf
Dropbox Support Specialist Phone Number.pdfDropbox Support Specialist Phone Number.pdf
Dropbox Support Specialist Phone Number.pdf
 
Help_Desk_System Presentation Overview
Help_Desk_System Presentation Overview Help_Desk_System Presentation Overview
Help_Desk_System Presentation Overview
 
Problem Manager
Problem ManagerProblem Manager
Problem Manager
 
Amberly Buckner Resume 2
Amberly Buckner Resume 2Amberly Buckner Resume 2
Amberly Buckner Resume 2
 
CV -linked in
CV -linked inCV -linked in
CV -linked in
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and design
 
WSC2015_WSSS39_IT_Network_Systems_Administration
WSC2015_WSSS39_IT_Network_Systems_AdministrationWSC2015_WSSS39_IT_Network_Systems_Administration
WSC2015_WSSS39_IT_Network_Systems_Administration
 
Designing the expert system
Designing the expert systemDesigning the expert system
Designing the expert system
 
Sreedhar CV_PKI - Certificate Management
Sreedhar CV_PKI - Certificate Management Sreedhar CV_PKI - Certificate Management
Sreedhar CV_PKI - Certificate Management
 

Mehr von Rheigh Henley Calderon

8 problem solving with the case logic structure
8 problem solving with the case logic structure8 problem solving with the case logic structure
8 problem solving with the case logic structureRheigh Henley Calderon
 
6 problem solving with decisions
6 problem solving with decisions6 problem solving with decisions
6 problem solving with decisionsRheigh Henley Calderon
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structureRheigh Henley Calderon
 
4 introduction to programming structure
4 introduction to programming structure4 introduction to programming structure
4 introduction to programming structureRheigh Henley Calderon
 
2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computerRheigh Henley Calderon
 
1 introduction to problem solving and programming
1 introduction to problem solving and programming1 introduction to problem solving and programming
1 introduction to problem solving and programmingRheigh Henley Calderon
 

Mehr von Rheigh Henley Calderon (20)

10 data structures
10 data structures10 data structures
10 data structures
 
9 processing arrays
9 processing arrays9 processing arrays
9 processing arrays
 
8 problem solving with the case logic structure
8 problem solving with the case logic structure8 problem solving with the case logic structure
8 problem solving with the case logic structure
 
7 problem solving with loops
7 problem solving with loops7 problem solving with loops
7 problem solving with loops
 
6 problem solving with decisions
6 problem solving with decisions6 problem solving with decisions
6 problem solving with decisions
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure
 
4 introduction to programming structure
4 introduction to programming structure4 introduction to programming structure
4 introduction to programming structure
 
3 programming concepts
3 programming concepts3 programming concepts
3 programming concepts
 
2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer2 beginning problem solving concepts for the computer
2 beginning problem solving concepts for the computer
 
1 introduction to problem solving and programming
1 introduction to problem solving and programming1 introduction to problem solving and programming
1 introduction to problem solving and programming
 
8 customer service
8 customer service8 customer service
8 customer service
 
7 laptop repair
7 laptop repair7 laptop repair
7 laptop repair
 
6 laptop basics
6 laptop basics6 laptop basics
6 laptop basics
 
5 pc maintenance
5 pc maintenance5 pc maintenance
5 pc maintenance
 
3 pc upgrade
3 pc upgrade3 pc upgrade
3 pc upgrade
 
2 pc assembly
2 pc assembly2 pc assembly
2 pc assembly
 
1 hardware fundamentals
1 hardware fundamentals1 hardware fundamentals
1 hardware fundamentals
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
6 professional ethics
6 professional ethics6 professional ethics
6 professional ethics
 

KĂźrzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

KĂźrzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

9 technical support

  • 1. Technical Support PC Repair and Troubleshooting
  • 2. Technical Support • refers to a range of services by which enterprises provide assistance to users of technology products – Mobiles – Computers – Software • attempt to help the user solve specific problems with a product • Via SMS, chat, email, phone, fax, forum, website, or remote access
  • 3. Remote PC Repair • method for troubleshooting software related problems via remote desktop connections • Technicians use software that allows the technician to access the user's desktop via the Internet. • With the user's permission, the technician can take control of the user's mouse and keyboard, transfer various diagnostic and repair applications to the user's desktop, run scans, install antivirus programs, etc. • If the remote service permits it, the technician can even reboot the PC and reconnect remotely to continue his work without the user needing to assist.
  • 4. Technical Support Common Activities • installing and configuring computer hardware operating systems and applications; • monitoring and maintaining computer systems and networks; • talking staff/clients through a series of actions, either face to face or over the telephone; • troubleshooting system and network problems and diagnosing and solving hardware/software faults; • replacing parts as required; • providing support, including procedural documentation; • following diagrams and written instructions to repair a fault or set up a system;
  • 5. • supporting the roll-out of new applications; • setting up new users’ accounts and profiles and dealing with password issues; • responding within agreed time limits to call-outs; • working continuously on a task until completion (or referral to third parties, if appropriate); • prioritising and managing many open cases at one time; • rapidly establishing a good working relationship with customers and other professionals (e.g., software developers); • testing and evaluating new technology; • conducting electrical safety checks on computer equipment
  • 6. Multi tiered technical support • Technical support is often subdivided into tiers, or levels, in order to better serve a business or customer base • The divisions of technicians is dependent on – the technicians’ understanding of their level of responsibility and commitments, – their customer response time commitments, – when to appropriately escalate an issue and to which level • A common support structure revolves around a three-tiered technical support system
  • 7. Tier 1 / Basic Support • initial support level responsible for basic customer issues • gather the customer’s information and to determine the customer’s issue by analysing the symptoms and figuring out the underlying problem • Once identification of the underlying problem is established, the specialist can begin sorting through the possible solutions available using some kind of knowledge management tool • 1st line support actually requires very good knowledge of the products, terms and conditions offered by the business rather than technical information itself
  • 8. Tier 2 / Advance Support • in-depth technical support level • assists Tier I personnel solve basic technical problems and investigates elevated issues by confirming the validity of the problem and seeking for known solutions related to these more complex issues • review the work order to see what has already been accomplished by the Tier I technician and how long the technician has been working with the particular customer • If a problem is new and/or personnel from this group cannot determine a solution, they are responsible for raising this issue to the Tier III
  • 9. Tier 3 / Expert Support • highest level of support in a three-tiered technical support model responsible for handling the most difficult or advanced problems • responsible for not only assisting both Tier I and Tier II personnel, but with the research and development of solutions to new or unknown issues • reviewing the work order and assessing the time already spent with the customer so that the work is prioritized and time management is sufficiently utilized • Upon encountering new problems; they must first determine if they can solve the problem and may require the customer’s contact information so that the technician can have adequate time to troubleshoot the issue and find a solution • an issue may be so problematic to the point where the product cannot be salvaged and must be replaced. Extreme problems are also sent to the original developers for in-depth analysis • If it is determined that a problem can be solved, this group is responsible for designing and developing one or more courses of action, evaluating each of these courses in a test case environment, and implementing the best solution to the problem. Once the solution is verified, it is delivered to the customer and made available for future troubleshooting and analysis.