Tuesday, December 24, 2013

Apple’s China Deal Helps Lift Technology Issues

Check out this technology article we found:

Stocks continued to climb in quiet trading on Monday, as investors began to close the books on 2013.
Apple helped lift technology stocks after it reached a deal to sell the iPhone through China’s largest wireless carrier.
The market has moved broadly higher since last Wednesday, when the Federal Reserve said it would start pulling back on its stimulus program next month as the economy improves. Last week, the government also raised its estimate for third-quarter economic growth to 4.1 percent, the fastest pace since 2011.
“Everything is going in the right direction,” said Rob Stein, chief executive of Astor Investment Management, based in Chicago.
The Standard & Poor’s 500-stock index was up 9.67 points, or 0.5 percent, to 1,827.99. The Dow Jones industrial average rose 73.47 points, or 0.5 percent, to 16,294.61. The Nasdaq composite rose 44.16 points, or 1.1 percent, to 4,148.90.
Apple rose $21.07, or 4 percent, to $570.09, after the company reached a deal with China Mobile, the world’s largest cellphone provider, to sell the iPhone in China. The iPhone is already sold through two smaller carriers there. Technology stocks in the S.&P. 500 rose 1.5 percent.
Trading was very light ahead of the Christmas holiday. On the New York Stock Exchange, 2.8 billion shares were traded, well below the recent average of 3.4 billion.
Both the New York Stock Exchange and the Nasdaq Stock Market will be closed Wednesday, Christmas Day. Both exchanges will also close at 1 p.m. Eastern time on Tuesday for Christmas Eve.
The market is heading for its best year in more than a decade. The S.&P. 500 index has increased 28 percent so far this year — 30 percent when dividends are included — putting it on track for its biggest annual gain since 1997.
“People want to hold on to these gains, so no one is going to take any undue risks this close to the end of the year,” said Stephen Carl, head equity trader at Williams Capital. The next two weeks, with Christmas and New Year’s Day both falling in the middle of the workweek, will very likely also see light trading, he said.
In other economic news, consumer spending rose 0.5 percent in November, the most since June.
Bond prices fell slightly. The 10-year Treasury note fell to
98 15/32, off 11/32, its yield rising to 2.93 percent from 2.89 percent.
Gold fell $6.70, or 0.6 percent, to $1,198.40 an ounce. Gold has slumped 29 percent this year and is headed for its first annual loss since 2000. Traders have dumped gold as fear that the Fed’s easy-money policies would cause inflation has dissipated.

Monday, December 16, 2013

The technology business week: Vodafone expands 4G coverage, Accelrys acquires Qumas

Read this article we found:

A digest of the top business technology news stories from the past week, beginning with mobile operator Vodafone expanding 4G coverage across Ireland.

Vodafone expands 4G coverage to six cities and 31 towns across Ireland

Vodafone has switched on 4G for smartphone users in six cities and 31 towns across Ireland, the mobile operator said this past week.
4G delivers data speeds of up to 10 times faster than 3G. At the same time, Vodafone is bringing 3G coverage to anywhere in Ireland that currently has voice coverage.
The six cities include Dublin, Cork, Limerick, Galway, Waterford and Kilkenny. The towns include Bagnelstown, Ballincollig, Bunclody, Carlow, Carrigaline, Carrigtohill, Cloyne, Cobh, Dungarvan, Dunmanway, Enniscorthy, Fermoy, Gorey, Kanturk, Kenmare, Killarney, Killorglin, Kinsale, Lismore, Listowel, Mallow, Midleton, Millstreet, New Ross, Newmarket, Rosslare Harbour, Rosslare Strand, Thomastown, Tralee, Tullow, and Wexford.

Accelrys acquires Qumas in US$50m deal

Life sciences software player Accelrys Inc has acquired cloud-based quality management software firm Qumas in a deal understood to be valued at around US$50m.
The acquisition of the Cork company will enable Accelrys to help its customers manage the scientific innovation lifecycle by reducing regulatory risks and improving compliance effectiveness.
Qumas integrates content, processes, people and systems into enterprise compliance programmes that eliminate the cost and complexity of managing paper-based as well as disparate or legacy document management applications.

IBM wins US$115m server contract with European Commission

IBM and business partner Bechtle AG have won a US$115m contract with the European Commission to provide servers to European Union institutions and agencies in the 27 member states. 
The contract is the largest and most comprehensive awarded by the European Commission for office and application servers.
IBM and Bechtle AG have already provided more than US$2.6m in systems and services to date and expect to deliver more than 6,100 System x and Flex System servers and supporting services over the course of the contract.

Monday, December 9, 2013

Ten Business Technology Trends You'll Read About in 2014

Read this article we found: 


Which business technologies will lead the way in 2014? Research firms, journalists, and bloggers are gearing up to share their thoughts on this question and offer their predictions over the few weeks. Immersed in today’s dynamic business technology environment and excited about what’s to come, we at LNS Research offer our early list of main focus areas you can expect experts to be discussing over the next few months.
1. Mobile
At this point in late 2013, reports suggest that mobile devices are outpacing PCs as the primary source for computing. Traditional business functions (and innovative new ones) are increasingly expected to be accompanied by a solution in the app store. In 2014, managing by walking around will continue to occur, only even more-so with a tablet or smartphone in hand.
Expect to see a diversity of predictions touching on further consumerization—and Bring Your Own Device (BYOD)—related issues. These will include supporting cloud-based, mobile application infrastructures, cybersecurity, compatibility, software-to-app migration, proximity sensing, and organizations’ abilities to match IT support capabilities with growing user needs.
2. Big Data & Analytics
In recent years, we’ve experienced an explosion of data. Reports say that the amount is doubling every few days. And with Internet/Intranet connectivity becoming more commonplace, new trajectories can be expected. Software vendors and in-house IT departments alike are working hard to develop simpler, faster solutions for harnessing this growing giant.
The challenge is certainly in a wrestling match with the opportunity right now and in 2014 we can expect that to shift into manufacturers' and other businesses' favor. Expect predictions around new techniques for uncovering consumer insights and manufacturing asset and production improvements, as well as a rise in cloud-based solutions for big data and analytics.
3. Cybersecurity
2013 was a tough year for cybersecurity. The NSA proved that information is not as secure from third-parties as many businesses assumed it was. And from corporate Twitter account breaches to confidential information getting into the wrong hands, we saw that hackers continue to be a very real threat.
As cloud, mobility, and connected devices make more headway in the business realm, expect to see predictions around the tradeoffs between accessibility, cost, and risk, as well as best practices for ongoing information security management and the need for ‘secure-by-design’ software and systems.

What Does Managed Services Mean?

Many firms promise managed services, but don't follow through as promised. TVG Consulting likes to be proactive in their work.  Most companies are just reactive to problems that have already occurred. Being proactive will prevent problems from occurring in the first place reducing IT downtime and costs.  Response time is also important in managed services.

Monday, December 2, 2013

BlackBerry head says company is 'very much alive'

Read this article we found:

BlackBerry's interim chief executive said Monday reports of the death of the company "are greatly exaggerated."
Former Sybase CEO John Chen said in a letter to customers that BlackBerry is returning to its roots, refocusing on delivering devices and services to business users.
Chen was brought in as the interim chief executive and executive chair after talks to sell the company collapsed last month.
He said in the letter that the company is aware that "BlackBerry is not for everyone."
Blackberry quickly lost dominance as the leading smartphone maker after the 2007 launch of Apple's touchscreen iPhone.
Chen notes that competitors are circling but that BlackBerry is "very much alive, thank you."
Chen said BlackBerry has substantial cash and said he'll refocus the company on four areas, including the handset business. Chen put more emphasis on BlackBerry's mobile device management business, which allows IT departments to manage different devices connected to their corporate networks. He also emphasized BlackBerry's popular BlackBerry Messenger application. And he mentioned embedded QNX software systems, which are used in-vehicle infotainment systems and industrial machines.
BGC analyst Colin Gillis said a letter meant to reassure customers is needed. The much-hyped BlackBerry 10 system, its latest phones, flopped. The company disclosed in September that it would book nearly a billion dollars in losses related to unsold phones and the company announced last month it was no longer for sale.
"They are being targeted pretty heavily. Their customers are up for grabs," Gillis said.
Focusing on business users is probably the only move Blackberry has left, Gillis said.
"It's a much smaller business. This is the niche player. You can build phones for those people in that niche. You can have a decent little business," Gillis said. "Enterprise customers who like keyboards. There's not really a good keyboard device out there. Some people like keyboards. I personally don't love typing on glass."
Gillis said he expects Chen to name himself CEO soon because he's not acting like an interim CEO. "He's signing all this stuff as CEO," Gillis said.
Shares of BlackBerry rose 4 cents to $6.37 in afternoon trading on the Nasdaq.
The decline of the BlackBerry has come shockingly fast. The BlackBerry, pioneered in 1999, changed the culture by allowing on-the-go business people to access wireless email. Then came a new generation of competing smartphones, and suddenly the BlackBerry looked ancient. Apple debuted the iPhone in 2007 and showed that phones can handle much more than email and phone calls. In the years since, BlackBerry been hammered by competition from the iPhone as well as Android-based rivals.

Can a Phone System Benefit Your Business?

Technology is so important to business productivity these days, and a phone system is no different.  Although there are many other means of communication, nothing is quite like the telephone and if your business doesn't have a system in place it might be suffering.  Customers like talking on the phone because its personal and allows them to reach you right away, unlike email.  TVG Consulting, an IT support company in Los Angeles, offers ALLWORX phone systems to their clients.

For more information visit their blog.

http://www.tvgconsulting.com/how-can-a-phone-system-benefit-my-business/


http://www.tvgconsulting.com/it-services/server-and-network-management-it-support-los-angeles/

Tuesday, November 26, 2013

Information security

Read this article we found:

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...)[1]
Two major aspects of information security are:
  • IT security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory (even a calculator). IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.
  • Information assurance: The act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where datahas the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. One of the most common methods of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.
Governmentsmilitarycorporationsfinancial institutionshospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.
Should confidential information about a business' customers or finances or new product line fall into the hands of a competitor or a black hat hacker, a business and its customers could suffer widespread, irreparable financial loss, not to mention damage to the company's reputation. Protecting confidential information is a business requirement and in many cases also an ethical and legal requirement.
For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.
The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including securing network(s) and allied infrastructure, securing applications and databasessecurity testing, information systems auditingbusiness continuity planning and digital forensics, etc.
This article presents a general overview of information security and its core concepts.

http://en.wikipedia.org/wiki/Information_security

Monday, November 25, 2013

How to Attract Men: Tips on What Men Want Book Review

Th new Ebook on Amazon: How to Attract Men: Tips on What Men Want is one I just got done reading

How to Attract Men: Tips on What Men Want Book Review

Th new Ebook on Amazon: How to Attract Men: Tips on What Men Want is one I just got done reading

In the eventuality of any difficulties, the video is additionally on offer at the following web page link

Sunday, November 24, 2013

How to Read Body Language Book

This book on how to read body language on Amazon is a great and simple read. Check out the link here:

http://www.amazon.com/Read-Body-Language-Audrey-Smith/dp/1480206415

If you want to sharper your skills on how to read body language I highly recommend reading this book.

Tags: hwo to read body language, how to read body language book

In the event the video clip in this article isn't functioning, make sure you visit here.

Additional reading: http://www.amazon.com/Read-Body-Language-Audrey-Smith/dp/1480206415

How to Lose Belly Fat Naturally Book

How to Lose Belly Fat Naturally Book review--Are you looking to lose belly fat? Look no further. This new book on Amazon gives great advice on losing belly fat the healthy way (http://www.amazon.com/How-Lose-Belly-Fat-Naturally/dp/1475242182).

With so many crash and fad diets out there, how do you know what will work? Luckily, this book is full of useful information that will help you create the best diet plan uniquely tailored to your needs.

tags - lose belly fat, lose weight, how to lose belly fat, how to lose weight, lose fat naturally, how to lose belly fat naturally

Saturday, November 23, 2013

How to Attract Men Book Review

On Amazon I foudn the How to attract men: Tips on what men want book here: http://www.amazon.com/How-Attract-Men-Tips-What-ebook/dp/B007E3SNLY And I must say it was really cool to learn the psychology of how men and women think.

Plus learning about how to attract the right kind of man and how to treat him so he stays around was eye opening for me because it is very simple yet very overlooked the advice that this book gives.

Overall thumbs up!

how to attract men

Thursday, November 21, 2013

What do Dreams Mean? Dream Book

What do dreams mean- A Dream Book on How to Interpret Dreams book review--Dreams are the only way that your subconscious communicates. When you go to sleep your brain awakens. This book called, "What do Dreams Mean," (http://www.amazon.com/What-Do-Dreams-Mean-Interpret/dp/1475170270/) gives numerous examples of dream sequences that could mean something.

There are chapters on dream symbols, the history of dream interpretation, etc.

This book is a must read if you are looking to understand your dreams.

tags - dream interpretations, what do dreams mean, dream symbols, dreams, how to interpret dreams, dream book, how to interpret dreams

dream book

Wednesday, November 20, 2013

How to Play Poker -for Beginners

Book review: How to play poker by Troy Smith--Poker can be a confusing game if you have never played it. It isn't easily taught, and can be tricky. This book called, "How to Play Poker," gives simple instructions on how to play a successful game http://www.amazon.com/How-Play-Poker-Troy-Smith/dp/1479196282).

"How to Play Poker," covers everything from the suits of the cards to winning the most money.

tags - poker, playing poker, how to play poker, poker instructions, winning at poker

how to play poker for beginners

How to Plan a Wedding

How to Plan a Wedding Book Review: This informative book will give you advice on all aspects of the wedding planning process (http://www.amazon.com/How-To-Plan-Wedding-ebook/dp/B008JFM0UQ).

Decisions like budget, the wedding venue, vows, the wedding ring, flowers, etc. can be difficult to make. An engaged couple should discuss options together and then choose which option is best for them. There are many chapters in this book, "How to Plan a Wedding," that focus on specific decisions that need to be made. The information given can be used to guide you through your wedding planning process from beginning to end.

tags - wedding planning, planning a wedding, wedding plans, how to plan a wedding, the wedding planning process

The use of IT

Check out this article we found:

Information Technology (IT) refers to techniques used in business for transmitting, storing, manipulating and retrieving all kinds of data, including speech, text, movie, graphics and reports of events such as equipment malfunction, intrusion etc. Typically, Information Technology relates to the hardware and software that businesses use to manage and operate a range of business processes. Most businesses network their computers so that information can be shared.
Examples of the use of IT in business include:
  • Storing information about products such as stock control using sophisticated databases.
  • Making business calculations such as costing and profit calculations using spreadsheets.
  • Providing advertising and promotional literature using computer graphics packages.
  • Processing information, writing letters, and other documents using word processing packages.
  • Internal communication using fax, e-mail and other methods of communication including telephone linking.
  • Using presentation software such as Power Point to make colourful presentations.
  • Creating websites as a promotional and informational tool for an organisation.

Time saving

IT applications are everywhere in the modern business and their great advantage is the way that they can lower costs. One way that costs can be lowered is in time saving. For example, time is saved in the retrieval of information from a database or website. Rapid searches can be carried out by simply cueing in a key word such as the name of a customer or a component.
Another way that time can be saved is in the rapid duplication of information. For example, an e-mail can be sent to all of the relevant members of an organisation simply by creating a pre-prepared mailing list for all communications of a certain type.
Material can be rapidly edited and altered using modern desktop computers.
Information Technology enables the global communication of information, as well as the global retrieval of information from databases and websites regardless of geographical distance.


Read more: http://businesscasestudies.co.uk/business-theory/operations/the-use-of-it.html#ixzz2lDMysZNf 

What Business Challenges Can a Computer Support Company Help With?

For any business information technology is extremely important. Especially for small businesses.  Your company's time is better spent working on your business tasks rather than pedaling around with IT requirements.  This is how a computer support company can help you, like TVG Consulting.  A computer support company can give advice and service for all your IT needs.  

Visit this computer support company in Los Angeles's blog for more information.

http://www.tvgconsulting.com/what-can-a-computer-support-company-do-for-my-business/


http://www.tvgconsulting.com/it-services/desktop-and-computer-support-los-angeles/

Wednesday, November 13, 2013

Lessons on Technology and Growth from Small-Business Leaders

Read this article we found:

Small and midsize enterprises (SMEs) are critical to fueling economic growth and job creation around the world. Their success matters. As SMEs search for ways to grow, they have the opportunity to embrace a new wave of information technologies. With the advent of the cloud, SMEs can access many of the same technologies as giant multinational companies. Yet the adoption of the latest IT by smaller companies has been decidedly uneven. This new digital divide threatens to widen the performance gap of SMEs as the pace of innovation accelerates.
To gain further insight into the factors that enable faster growth among SMEs and the role that technology adoption plays, Microsoft commissioned The Boston Consulting Group to prepare this independent report. The findings outlined below have been discussed with Microsoft executives, but BCG is responsible for all the analysis and conclusions.The prospect of a growing technology gulf is relevant both for companies themselves and for policymakers around the world. The experience of technology leaders among smaller businesses shows a strong correlation between the adoption of advanced information technologies on the one hand and growth in revenue and jobs on the other.

Tuesday, November 5, 2013

The Biggest Information-Security Issues for Companies

Read this article we found:

The importance of safeguarding employee data is not a new imperative, but I think there are reasons to believe it should be given much greater importance. With the rise of talent analytics, companies are collecting increasing quantities of information about their employees, and perhaps even more important is that the predictive power of this information is increasing as well.
As we continue to learn more about the scientific linkages between behavior, brain and body, the fact is that information collected about any one member of this triad has the potential to reveal much about the others. For example, measurements about a healthy person's gait while walking is now linked to the later onset of Alzheimer's disease. Several startup companies working with scientists are developing simple games that are thought to implicitly measure various cognitive abilities and personality traits.
Why does this matter? Companies are using increasingly sophisticated types of cognitive, emotional and social assessments of their employees with the objective of using advanced analytics to link these measures to performance. As both the scientific understanding of human behavior and the use of talent analytics advances, employee data collected and maintained by companies will become ever more predictive and revealing. This data in the wrong hands has the potential to ruin careers and lives, and companies have an obligation to take the effort required to safeguard it.

What are the Benefits of Using IT in Business?

One major benefit of using information technology in business is faster and more affordable communication between employees and clients.  More and more companies are looking to IT for solutions in their offices.  This can build business and strengthen relationships that are necessary for the company to run smoothly. Communication through technology not only saves time, but money as well. 

Learn more on this IT services in Los Angeles's blog.

http://www.tvgconsulting.com/tvg-consulting-which-provides-it-services-talks-about-the-benefits-of-technology-in-business/


http://www.tvgconsulting.com/it-services/

Tuesday, October 29, 2013

Deferred IT maintenance is a ticking time bomb

Check out this article we found:

$500 billion -- it's a number so big you'd assume it's a component of the national debt. It isn't. Instead, it's what Gartner analyst Andy Kyte calls the IT debt. "When budgets are tight, maintenance gets cut. After a decade of tight budgets, the scale of the maintenance backlog has created systemic risk, particularly for large organizations," he says.
The "debt" really has two major components: One is underfunding and even neglect of routine but important hardware replacement purchases and software upgrades. The other is the slow degradation of enterprise applications.
[ InfoWorld's Bob Lewis explains why running IT as a business is a train wreck waiting to happen. | Subscribe today to Lewis' Advice Line newsletter for IT managers. ]
On the most obvious level, managers like Steve Davidek, the system administrator for the city of Sparks, Nev., scrambles to keep systems up and running with budgets that barely covered the basics. Sparks, with a population of about 88,000, was hit hard by the recession, and when it came time to trim services, the IT department was in the cross-hairs, losing 6 of its 14 full-time employees.
"It's been a Band-Aid approach, and the people we support are on the verge of not getting what they need," he says. When money does flow, Davidek says, he hopes to complete the virtualization of servers in the data center, a key task that was just half done during the recession.
Choices made by IT have also contributed to the "debt." Mundane "run the business" expenses are taking a backseat to initiatives, particularly cloud computing, that management hopes will save money in the not-too-distant future, says Harcharan Sing Rajpal, head of Tata's IT application services consultancy for North America.
The second leg of the "IT debt" monster has to do with aging enterprise applications. In reality, these apps are collections of data and business logic encapsulated in programming instructions and myriad platform components, such as operating systems, databases, hardware, and network infrastructure, Kyte says. As they age, these apps are "inevitably diverging from an ideal state toward a suboptimal state, and potentially toward obsolescence or failure."
In normal times, maintenance would slow the decay, "but such investments can be tough to justify in a tight economy when precious investment funds need to be used to deliver short-term, visible business benefits," Kyte says. Even if the current version of an application is running well, the next upgrade for many applications is going to involve a substantial shift in the underlying platform infrastructure.
It would be easy to dismiss Kyte's analysis by claiming IT always wants more. But he says this time, it's different: "While it is true that there has never been an IT organization without a backlog of maintenance activity, the scale of the problem is significantly greater than it has ever been. It is not unreasonable to suggest that the maintenance backlog -- and, therefore, the 'IT debt' -- was probably at an all-time low on 31 December 1999, when every IT organization had spent a significant amount of money upgrading or replacing systems in order to deal with Y2K.
"Since then, however, the demands for IT investment to deliver real business value through running, growing, or transforming the business have drained the maintenance coffers year after year, so year after year the IT debt has grown," Kyte says.
Is that $500 billion number too high? Kyte says he derived it by analyzing several large Gartner clients that generally do a good job of keeping applications up to date. That led him to estimate that a typical Fortune 2000 company would require upgrades costing more than $200 million each.

Monday, October 21, 2013

IT service management

Read this Wikipedia article we found: 

IT service management or IT service support management (ITSM or ITSSM) refers to the implementation and management of quality information technologyservices. IT service management is performed by IT service providers through people, process and information technology.[1] The following represents a characteristic statement from the ITSM literature:
Providers of IT services can no longer afford to focus on technology and their internal organization[;] they now have to consider the quality of the services they provide and focus on the relationship with customers.[2]
ITSM is process-focused and has ties and common interests with process improvement frameworks and methodologies (e.g., TQM, Six Sigma, business process management, CMMI). The discipline is not concerned with the details of how to use a particular vendor's product, or necessarily with the technical details of the systems under management. Instead, it focuses upon providing a framework to structure IT-related activities and the interactions of IT technical personnel with business customers and users.
IT service management in the broader sense overlaps with the disciplines of business service management and IT portfolio management, especially in the area of IT planning and financial control. ITSM is generally concerned with the "back office" or operational concerns of information technology management (sometimes known as operations architecture), and not with technology development. In this respect, ITSM may be seen as analogous to an enterprise resource planning (ERP) discipline for IT.


5 Reasons to Outsource Your IT Company

Every business has its focus.  It can be advertising, design, finance, business, etc. It is beneficial for these companies to hire employees with knowledge and experience about their given field   Therefore, it does not make sense for a business who's main focus is not IT to hire a full time IT employee.  Doing this could cost the company money and productivity.  To avoid this, businesses should outsource their IT support company. 

Check out TVG Consulting's blog, an IT support company in Los Angeles.

http://www.tvgconsulting.com/tvg-consulting-a-company-offering-it-support-gives-5-reasons-to-outsource-an-it-company/


http://www.tvgconsulting.com/it-services/server-and-network-management-it-support-los-angeles/

Wednesday, October 16, 2013

Technical Support

Read this article we found about technical support:

Technical support or tech support refers to a range of services by which enterprises provide assistance to users of technology products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods. In general, technical support services attempt to help the user solve specific problems with a product—rather than providing training, customization, or other support services. Most companies offer technical support for the products they sell, either freely available or for a fee. Technical support may be delivered over the telephone or online by e-maillive support software on a website or a tool where users can log a call/incident. Larger organizations frequently have internal technical support available to their staff for computer related problems. The internet is also a good source for freely available tech support, where experienced users may provide advice and assistance with problems. In addition, some fee-based service companies charge for premium technical support services.[1]

to read the rest:
http://en.wikipedia.org/wiki/Technical_support