SlideShare a Scribd company logo
1 of 39
David Strom
Lessons for IT from the Front
Lines of Customer Support
Author & IT Expert
© 2015 Citrix.
Moderator
James Hilliard
Hilly Productions
© 2015 Citrix.
Q & A
Type questions and
comments
© 2015 Citrix.
Follow Us
#GoToAssistWBR
@hillyprods
@GoToAssist
@dstrom
© 2015 Citrix.
Presenter
David Strom
Editor and IT Expert
© 2015 Citrix.
© 2015 Citrix.
© 2015 Citrix.
© 2015 Citrix.
© 2015 Citrix.
© 2015 Citrix.
First you have to listen to your customers!
© 2015 Citrix.
© 2015 Citrix.
© 2015 Citrix.
Ask these
questions to your
“bounceback” customers
© 2015 Citrix.
© 2015 Citrix.
Track customer sentiment
© 2015 Citrix.
© 2015 Citrix.
Are you asking the right questions?
© 2015 Citrix.
Neil deGrasse
Tyson
© 2015 Citrix.
Build data dashboards
© 2015 Citrix.
The worst thing you can do when
it comes to customer retention is
to over-promise and under-
deliver.
© 2015 Citrix.
Be honest when a problem occurs
© 2015 Citrix.
Use good judgment in all situations
© 2015 Citrix.
Or the “IT Crowd”
© 2015 Citrix.
Be proactive in all your communications
© 2015 Citrix.
Train your customer-facing teams
© 2015 Citrix.
Analyze your “leads funnel”
© 2015 Citrix.
© 2015 Citrix.
© 2015 Citrix.
© 2015 Citrix.
Know your biggest troublemakers
© 2015 Citrix.
Recruit your brand ambassadors carefully!
© 2015 Citrix.
Find stupid stuff and fix quickly
© 2015 Citrix.
My review in Network World of various
social media monitoring tools
© 2015 Citrix.
© 2015 Citrix.
© 2015 Citrix.
Q & A
David Strom
Author & IT Expert
http://www.strom.com/
@dstrom
James Hilliard
Hilly Productions
www.hillyproductions.com
@hillyprods
Please fill out the survey
that appears after you
leave the webinar
How’d we do?
Thanks for Attending!

More Related Content

Viewers also liked

How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingDavid Strom
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkDavid Strom
 
Business Plan Presentation Template
Business Plan Presentation TemplateBusiness Plan Presentation Template
Business Plan Presentation TemplateJeff Chung
 
Business Plan Presentation Template - A FlackVentures Example
Business Plan Presentation Template - A FlackVentures ExampleBusiness Plan Presentation Template - A FlackVentures Example
Business Plan Presentation Template - A FlackVentures ExampleKate Pynn
 
Data Analytics Strategy
Data Analytics StrategyData Analytics Strategy
Data Analytics StrategyeHealthCareers
 
Developing A Strategic Business Plan
Developing A Strategic Business PlanDeveloping A Strategic Business Plan
Developing A Strategic Business PlanEarl Stevens
 

Viewers also liked (9)

How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
Business Plan Presentation Template
Business Plan Presentation TemplateBusiness Plan Presentation Template
Business Plan Presentation Template
 
Business Plan Template
Business Plan TemplateBusiness Plan Template
Business Plan Template
 
8 Steps to Creating a Data Strategy
8 Steps to Creating a Data Strategy8 Steps to Creating a Data Strategy
8 Steps to Creating a Data Strategy
 
Business Plan Presentation Template - A FlackVentures Example
Business Plan Presentation Template - A FlackVentures ExampleBusiness Plan Presentation Template - A FlackVentures Example
Business Plan Presentation Template - A FlackVentures Example
 
Data Analytics Strategy
Data Analytics StrategyData Analytics Strategy
Data Analytics Strategy
 
Developing A Strategic Business Plan
Developing A Strategic Business PlanDeveloping A Strategic Business Plan
Developing A Strategic Business Plan
 
Business Plan
Business PlanBusiness Plan
Business Plan
 

Similar to Listen to Your Customers: How IT Can Provide Better Support

Cloud services provider sales techniques
Cloud services provider sales techniquesCloud services provider sales techniques
Cloud services provider sales techniquesLori Mankin
 
10 characteristics of a successful competitive Citrix Service Provider
10 characteristics of a successful competitive Citrix Service Provider10 characteristics of a successful competitive Citrix Service Provider
10 characteristics of a successful competitive Citrix Service ProviderScott Lindars
 
assert(CPA < LTV) - the most important line of code (AKA Startup Metrics ...
assert(CPA < LTV)  - the most important line of code (AKA Startup Metrics ...assert(CPA < LTV)  - the most important line of code (AKA Startup Metrics ...
assert(CPA < LTV) - the most important line of code (AKA Startup Metrics ...David Jones
 
"5 Keys for Delivering Personalized Marketing" - Merkle + Deckers Brands, Dig...
"5 Keys for Delivering Personalized Marketing" - Merkle + Deckers Brands, Dig..."5 Keys for Delivering Personalized Marketing" - Merkle + Deckers Brands, Dig...
"5 Keys for Delivering Personalized Marketing" - Merkle + Deckers Brands, Dig...Tealium
 
Aligning Services, Support, and Success Teams
Aligning Services, Support, and Success TeamsAligning Services, Support, and Success Teams
Aligning Services, Support, and Success TeamsGainsight
 
Making big data work
Making big data work Making big data work
Making big data work Ed Thewlis
 
Business Meets IT Keynote 24/6/2014 William Visterin
Business Meets IT Keynote 24/6/2014 William VisterinBusiness Meets IT Keynote 24/6/2014 William Visterin
Business Meets IT Keynote 24/6/2014 William VisterinWilliam Visterin
 
Driving Conversions Through B2B Personalization
Driving Conversions Through B2B PersonalizationDriving Conversions Through B2B Personalization
Driving Conversions Through B2B PersonalizationDemandbase
 
Powering Omnichannel Experiences with Real-Time Data
Powering Omnichannel Experiences with Real-Time DataPowering Omnichannel Experiences with Real-Time Data
Powering Omnichannel Experiences with Real-Time DataTealium
 
Customer Success and Security Technology
Customer Success and Security TechnologyCustomer Success and Security Technology
Customer Success and Security TechnologyGainsight
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
Assessing Technology Risk of Small Business - SCORE.PPTX
Assessing Technology Risk of Small Business - SCORE.PPTXAssessing Technology Risk of Small Business - SCORE.PPTX
Assessing Technology Risk of Small Business - SCORE.PPTXLinda Kuppersmith
 
Tackling the Omnichannel Customer Data Challenge
Tackling the Omnichannel Customer Data ChallengeTackling the Omnichannel Customer Data Challenge
Tackling the Omnichannel Customer Data ChallengeG3 Communications
 
eFinancials presentation Virtual Affairs by Enrico Pruis and Michiel Poppen (...
eFinancials presentation Virtual Affairs by Enrico Pruis and Michiel Poppen (...eFinancials presentation Virtual Affairs by Enrico Pruis and Michiel Poppen (...
eFinancials presentation Virtual Affairs by Enrico Pruis and Michiel Poppen (...Virtual Affairs
 
Metrics that Matter in the Boardroom
Metrics that Matter in the BoardroomMetrics that Matter in the Boardroom
Metrics that Matter in the BoardroomCprime
 
Webinar: The Innovator's Hypothesis by Michael Schrage
Webinar: The Innovator's Hypothesis by Michael SchrageWebinar: The Innovator's Hypothesis by Michael Schrage
Webinar: The Innovator's Hypothesis by Michael Schragebusinessforward
 
itSMF Belgium event 13/5/2015 : ABC for ICT workshop
itSMF Belgium event 13/5/2015 : ABC for ICT workshopitSMF Belgium event 13/5/2015 : ABC for ICT workshop
itSMF Belgium event 13/5/2015 : ABC for ICT workshopitSMF Belgium
 
Big Data Thinkers: Six Keys for 2015
Big Data Thinkers: Six Keys for 2015Big Data Thinkers: Six Keys for 2015
Big Data Thinkers: Six Keys for 2015IBM Analytics
 
What Going Digital Really Means to IT
What Going Digital Really Means to IT What Going Digital Really Means to IT
What Going Digital Really Means to IT MuleSoft
 
The Digital Transformation of ITSM
The Digital Transformation of ITSMThe Digital Transformation of ITSM
The Digital Transformation of ITSMDoug Tedder
 

Similar to Listen to Your Customers: How IT Can Provide Better Support (20)

Cloud services provider sales techniques
Cloud services provider sales techniquesCloud services provider sales techniques
Cloud services provider sales techniques
 
10 characteristics of a successful competitive Citrix Service Provider
10 characteristics of a successful competitive Citrix Service Provider10 characteristics of a successful competitive Citrix Service Provider
10 characteristics of a successful competitive Citrix Service Provider
 
assert(CPA < LTV) - the most important line of code (AKA Startup Metrics ...
assert(CPA < LTV)  - the most important line of code (AKA Startup Metrics ...assert(CPA < LTV)  - the most important line of code (AKA Startup Metrics ...
assert(CPA < LTV) - the most important line of code (AKA Startup Metrics ...
 
"5 Keys for Delivering Personalized Marketing" - Merkle + Deckers Brands, Dig...
"5 Keys for Delivering Personalized Marketing" - Merkle + Deckers Brands, Dig..."5 Keys for Delivering Personalized Marketing" - Merkle + Deckers Brands, Dig...
"5 Keys for Delivering Personalized Marketing" - Merkle + Deckers Brands, Dig...
 
Aligning Services, Support, and Success Teams
Aligning Services, Support, and Success TeamsAligning Services, Support, and Success Teams
Aligning Services, Support, and Success Teams
 
Making big data work
Making big data work Making big data work
Making big data work
 
Business Meets IT Keynote 24/6/2014 William Visterin
Business Meets IT Keynote 24/6/2014 William VisterinBusiness Meets IT Keynote 24/6/2014 William Visterin
Business Meets IT Keynote 24/6/2014 William Visterin
 
Driving Conversions Through B2B Personalization
Driving Conversions Through B2B PersonalizationDriving Conversions Through B2B Personalization
Driving Conversions Through B2B Personalization
 
Powering Omnichannel Experiences with Real-Time Data
Powering Omnichannel Experiences with Real-Time DataPowering Omnichannel Experiences with Real-Time Data
Powering Omnichannel Experiences with Real-Time Data
 
Customer Success and Security Technology
Customer Success and Security TechnologyCustomer Success and Security Technology
Customer Success and Security Technology
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
Assessing Technology Risk of Small Business - SCORE.PPTX
Assessing Technology Risk of Small Business - SCORE.PPTXAssessing Technology Risk of Small Business - SCORE.PPTX
Assessing Technology Risk of Small Business - SCORE.PPTX
 
Tackling the Omnichannel Customer Data Challenge
Tackling the Omnichannel Customer Data ChallengeTackling the Omnichannel Customer Data Challenge
Tackling the Omnichannel Customer Data Challenge
 
eFinancials presentation Virtual Affairs by Enrico Pruis and Michiel Poppen (...
eFinancials presentation Virtual Affairs by Enrico Pruis and Michiel Poppen (...eFinancials presentation Virtual Affairs by Enrico Pruis and Michiel Poppen (...
eFinancials presentation Virtual Affairs by Enrico Pruis and Michiel Poppen (...
 
Metrics that Matter in the Boardroom
Metrics that Matter in the BoardroomMetrics that Matter in the Boardroom
Metrics that Matter in the Boardroom
 
Webinar: The Innovator's Hypothesis by Michael Schrage
Webinar: The Innovator's Hypothesis by Michael SchrageWebinar: The Innovator's Hypothesis by Michael Schrage
Webinar: The Innovator's Hypothesis by Michael Schrage
 
itSMF Belgium event 13/5/2015 : ABC for ICT workshop
itSMF Belgium event 13/5/2015 : ABC for ICT workshopitSMF Belgium event 13/5/2015 : ABC for ICT workshop
itSMF Belgium event 13/5/2015 : ABC for ICT workshop
 
Big Data Thinkers: Six Keys for 2015
Big Data Thinkers: Six Keys for 2015Big Data Thinkers: Six Keys for 2015
Big Data Thinkers: Six Keys for 2015
 
What Going Digital Really Means to IT
What Going Digital Really Means to IT What Going Digital Really Means to IT
What Going Digital Really Means to IT
 
The Digital Transformation of ITSM
The Digital Transformation of ITSMThe Digital Transformation of ITSM
The Digital Transformation of ITSM
 

More from David Strom

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023David Strom
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity JobDavid Strom
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacyDavid Strom
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsDavid Strom
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking backDavid Strom
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media worldDavid Strom
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of ThingsDavid Strom
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersDavid Strom
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches David Strom
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)David Strom
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and nowDavid Strom
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakesDavid Strom
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015David Strom
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies David Strom
 
Navigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireNavigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireDavid Strom
 
Virtual machine security products
Virtual machine security productsVirtual machine security products
Virtual machine security productsDavid Strom
 

More from David Strom (20)

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies
 
Navigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireNavigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaire
 
Virtual machine security products
Virtual machine security productsVirtual machine security products
Virtual machine security products
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Listen to Your Customers: How IT Can Provide Better Support