Wednesday, February 26, 2014

15 Non-Certified IT Skills Growing in Demand

Whether you're a senior IT executive evaluating staffing needs and preparing budgets or an IT pro deciding where to invest your time to gain new skills, knowing what technologies are in demand should be a key part of your strategy.

The Hottest Non-Certified IT Skills for Growth in 2014
Architects, mobile developers and IT pros who are proficient in several flavors of big data and analytics are the top dogs in this look at the non-certified IT skills poised for growth in 2014. Last week, Foote Partners released its Q1 quarterly report, the IT Skills Demand and Pay Trends Report. Its data tells a story of more incremental improvements for both certified and non-certified IT skills.

Non-certified IT skills have seen eight consecutive quarters of growth. According to Foote Partners data, gains in database, systems, and information security skills are driving growth in both areas with assistance from network, communications and management, methodology, process and architecture, project management and process skills.

Foote Partners IT Skills Demand and Pay Trends Methodology
We spoke with David Foote, co-founder, chief analyst and research officer and other industry professionals to find out which of the 354 non-certified IT skills reported upon will generate the largest gains in 2014.

Programmers and IT pros with the skills on this list are getting what Foote refers to as a skills premium above base salary, and that increase is predicted to grow over the next six months.

Apache Cassandra Skills
Big data is driving demand for Apache Cassandra and several other skills on this list. As more companies get on the big data bandwagon, demand will increase. "We absolutely see demand for this skill. Apache Cassandra is designed to handle large amounts of data, and data management continues to be an in-demand skillset," says Matt Ripaldi, senior vice president of Modis, an IT staffing firm.

Apache CouchDB Skills
"Relax" is the battle cry of the CouchDB developer. CouchDB is an open source document-oriented database that is scalable and commonly referred to as fault-tolerant. This skill has seen more than 22 percent growth in the last 12 months and, according to Foote Partners, is predicted to continue its upward trend.

Big Data Analytics Skills
Analytics is the point where all of these big data skills meet. Finding patterns and actionable data in the mountains of information collected is a skill that will likely increase well into the future. "This is a big one. While anything, big data related is a hot skillset/job, analytics is really the spear-point of industry demand," says Matt Ripaldi, senior vice president of Modis, an IT staffing firm.

Business Intelligence Skills
IT pros with business intelligence skills facilitate transformation of raw data into meaningful and useful information to move business objectives forward. Demand for this skill is consistently high and will likely grow as more brick and mortar companies go digital.

"BI has consistently been one of the most in-demand skillsets over the past years and we see that demand grow regularly each year. Modern businesses increasingly need intelligence and strategic input from their IT departments, so an IT professional with BI skills is a strong career combination to wield," says Matt Ripaldi, senior vice president of Modis, an IT staffing firm.

Capacity Planning/Management Skills
According to David Foote of Foote Partners, demand for this IT skill is driven up by cloud adoption. The scalability of the cloud is one of the reasons it's so popular, but that capability to scale fast means doing things different than they've been done in the past and through a third-party, making capacity planning and management a much-needed skill.

Data Architecture Skills
The amount of data we are keeping is growing. IBM estimates that the world creates 2.5 quintillion bytes of new data a day. According to research analysts from IDC, if you are an adult between the ages of 45 and 59, you create 1.8 million gigabytes of data about yourself each year. This is on top of the 4.1 million gigabytes of ambient information that already exists about you in the digital universe. That's a lot of data and someone needs to architect its capture, storage, flow and usage. These highly knowledgeable individuals have a vision from beginning to end, visualizing how data will be channeled through several databases to create an effective flow of business data.

Data Governance Skills
With all this data being collected, it becomes more important to define who is the custodian/owner of that data and controls how it is used, stored, secured and made available. That's where data governance comes in. IT pros with this tech skill will help create and implement policy and processes and ensure compliance regarding the many different sources of data. Different companies will have different needs depending on their size and industry, but in general the more compliance and regulations needs you have the more critical this becomes.

HBase Skills
Continued demand for HBase talent is driven by the adoption of big data and is generally used for real-time read/write access to large datasets. Gains for this much-desired skill has increased more than 36 percent over the last 12 months and are projected to continue.

Information Management Skills
Information management skills entail using technology to collect, process, coordinate and disseminate information. The bottom-line is furthering strategic objectives and goals through the creation of and effective use of information from varying sources. According to the University of Toronto, information management consists of six closely related activities.

Identification of information needs
Acquisition and creation of information
Analysis and interpretation of information
Organization and storage of information
Information access and dissemination
Information use

Mobile Applications Development Skills
Mobile development has been one of the hottest growth areas inside of IT for a while and it's not slowing down. Having the right skills in this area means you can write your own ticket.

David Foote of Foote Partners says that up to this point companies have perhaps been taking people already in the organization -- maybe a Java programmer and paying them a premium, but not necessarily giving them the title mobile application developer. "We've had enough interest from our customers asking us if we have information on these jobs that we think it's starting to become a legitimate job title," says Foote.

Some other IT job titles getting used most recently according to Foote, senior software engineer mobile front-end and senior software engineer mobile...

Mobile Security Skills
Getting data stolen isn't good for your customers or your brand, so it's no mystery why this skill is here (but you're probably wondering why every type of IT security didn't make the list). As the popularity of smartphones, tablets and other mobile devices have skyrocketed so have the potential security risks. Cyber battles wage on with no end in sight and because of that IT pros with mobile security skills will continue to be a sought after commodity.

"We see mobile applications demand manifested particularly in application testing and security," says Matt Ripaldi, senior vice president of Modis, an IT staffing firm.

MongoDB Skills
Another open source, cross-platform, document-oriented database, MongoDB, uses JSON-like documents with dynamic schemas to store your data, instead of storing your data in tables and rows as you do in a relational database. It's easy to see how much affect big data is having on IT organizations everywhere by looking at how many of the hottest skills are being driven by companies trying to capitalize on the promise of big data.

Network Security Management Skills
Your data and information is only as secure as the network you store it in, making network security management an essential component of any IT security strategy. "Companies must protect their customers' sensitive information no matter where it resides -- be it on a PC, mobile device, corporate network or data center, " Anil Chakravarthy, executive vice president of the information security group at Symantec.

NoSQL Skills
The nonrelational database system that NoSQL provides creates better scalability and performance when working with extremely large datasets than does traditional relational databases (RDBMS). Demand for NoSQL is being driven by big data adoption. As more companies look to gain a competitive edge through the big data, skills like HBase, NSQL, MongoDB and other related IT skills, will likely continue to increase in demand.

Oracle Applications Developer Framework Skills
Java is the backbone of many industries and always a favorite on the Tiobe Programming Index, so it's no surprise that Oracle made the list. These professionals work to develop, test, implement and document applications. Testing, debugging and refinement are all part of the job as well.

Honorable Mention Slide
These IT skills also made the Foote Partner's list of non-certified IT skills that earn workers above average pay premiums. All of these skills have been earning above average rates over the past six months, Foote Partners says that they are likely to continue to gaining market value over the next three to six months.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, February 25, 2014

Free tools for Windows Server admins

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones. They can help you with deploying, maintaining, troubleshooting, and upgrading Window Servers, your domain, and aid with other miscellaneous network tasks.

Best Practices Analyzer
Microsoft provides the Best Practices Analyzer tool right inside Windows Server, starting with Windows Server 2008 R2, available on each role’s home page in the Server Manager console. It scans and analyzes key settings of the server roles and reports compliance of them compared to the best practices standards. This can help you identify potential issues that may affect security and performance.

It scans for a variety of rules, including those relating to predeployment, security, performance, and configuration. Statuses shown in the results include compliant, noncompliant, and warning. (Watch the slideshow version of this story.)

Core Configurator
Starting with Windows Server 2008, there’s a Server Core installation option. It’s great if you want a minimal installation, but it only gives you the Command Prompt for the interface. However, there are tools that give you a GUI on the Core editions of Windows Server. You can setup and configure most features via the GUI rather than being forced to use text commands.

Core Configurator 2.0 supports Windows Server 2008 R2 x64 and Corefig is for Windows Server 2012 Core and Hyper-V Server 2012.

Exchange Server Deployment Assistant
Microsoft offers the Exchange Server Deployment Assistant, an online tool that asks you deployment related questions and then generates a custom step-by-step checklist to use during an Exchange install or upgrade.

It asks questions about your current configuration, desired deployment environment (on-premise, cloud, or hybrid), migration questions, and desired features/functionality. In the end you’re presented with a wizard type of checklist, which is saved so you can return later and can be printed out as well.

Role-based Access Control (RBAC) Manager
By default, you must use PowerShell commands to manage the new role-based access controls of Exchange, which debuted in Exchange 2010 and eliminates the use of access control lists (ACL). However, the Role-based Access Control (RBAC) Manager provides a GUI to edit these role-based access controls, which gives you the ability to easily add/remove cmdlets and edit cmdlet properties and assignments.

The RBAC Manager supports Exchange 2010 SP2, Exchange 2013 Preview and Office 365.

Exchange Reports
Exchange Reports provides you with insight on your Exchange server and environment, supporting Exchange 2010 and Exchange 2013. It helps keeps you up-to-date with the server status, changes, and stats. It provides a group report and details on individual groups, mailbox report and details on individual mailboxes, an environment report, and it supports message tracking.

The program doesn’t require any installation, but requires .Net 4.0, Powershell 2.0, and Remote Powershell access to the Exchange Server. You can save reports and also export them to Excel.

Active Directory Explorer
Active Directory Explorer is an Active Directory viewer and editor, which you can use to browse the Active Directory database. You can view object properties and attributes, modify permissions, and view an object's schema.

It supports saving off-line snapshots, creating favorite locations, and saving advanced searches. You can also compare two Active Directory snapshots to see what objects, attributes and security permissions changed between them.

Remote Desktop Manager
The Remote Desktop Manager provides a single platform for centralized access to many types of remote connections and remote services, along with the ability to save their passwords and login credentials. It can save you the time and hassle in managing and utilizing all the different types of remote access methods.

It can manage remote connections via Microsoft Remote Desktop (RDP, RemoteFX), Microsoft Windows Azure (RDP), Microsoft Hyper-V (RDP), Microsoft Remote Assistance, VNC (RealVNC / TightVNC / UltraVNC / built-in), Citrix (ICA / HDX / Web), Web (HTTP / HTTPS), LogMeIn (Free / Pro), TeamViewer, and PC Anywhere. It also supports management of FTP, FTPS and SFTP (Windows Explorer / Filezilla / WinSCP / built-in) and Telnet, SSH, RAW and rLogin (Putty / Kitty / built-in).

They offer a premium edition with a free 30-day trial but they also provide a completely free edition with limited functionality.

Microsoft Remote Connectivity Analyzer
Microsoft provides the Remote Connectivity Analyzer, which can help you test and troubleshoot the connectivity of Exchange servers, Outlook, Lync, OCS, Office 365, and email (POP, IMAP, and STMP). It’s mostly an online tool, a website where you can input server addresses and login credentials in order to run the connectivity tests. It also provides a message header analyzer.

On the website you can also download the Microsoft Connectivity Analyzer Tool to run local tests to identify common connectivity issues for Outlook, Lync, and Office 365. And you can download the Microsoft Lync Connectivity Analyzer Tool to locally analyze a Lync deployment to see if it meets the requirements to support connections from Lync Windows Store app for Windows 8 and Windows RT, and from Lync mobile apps.

NetSetMan
As a network administrator you’re likely connecting to different networks or often changing your network settings. NetSetMan can help manage these different settings. You can save and switch between different profiles, which enable you to easily change your IP, DNS, and many more network-related settings.

In the profiles you can specify the Computer Name, Workgroup/Domain, and MAC Address. You can set a Proxy, SMTP Server, Browser Home Page, Default Printer, and Network Drives. You can also configure Hosts File Entries, Route Table, Scripts (BAT, VS, JS, etc), and other System Settings.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, February 18, 2014

Top 5 ways that IT wastes money

A number of common IT projects that seem like they should add value rarely do. Here are what I consider the top IT projects that waste budget dollars.

The role of the CIO has changed more in the past five years than any other position in the business world. Success for the CIO used to be based on bits and bytes, and is now measured by business metrics. Today’s CIO needs to think of IT more strategically and focus on projects that lower cost, improve productivity, or both, ideally.

However, many IT projects seem to be a waste of time and money. It’s certainly not intentional, but a number of projects that seem like they should add value rarely do. Here are what I consider the top IT projects that waste budget dollars.

Over provisioning or adding more bandwidth
Managing the performance of applications that are highly network-dependent has always been a challenge. If applications are performing poorly, the easy thing to do is just add more bandwidth. Seems logical. However, bandwidth is rarely actually the problem, and the net result is usually a more expensive network with the same performance problems. Instead of adding bandwidth, network managers should analyze the traffic and optimize the network for the bandwidth-intensive applications.

Investing in fault management tools
On paper, it makes sense to invest in fault management. You deploy network devices, servers, security products, and other infrastructure, so of course you would want to know when devices are up and down. However, the fact is that today we build our network so redundant that the loss of any single device has little impact on the performance of applications. Also, most of the fault management tools have a big blind spot when it comes to virtual resources, as the tools were designed to monitor physical infrastructure. IT organizations should focus on performance solutions that can isolate what’s been “too wrong for too long” to solve those nagging “brown outs” that cause user frustration.

Focusing IT energy only on the "top talkers"
When I talk to IT leaders about new initiatives, it seems much of the focus is on the top 5 or 10 applications, which makes some sense conceptually as these are the apps that the majority of workers use. Instead, IT leaders should monitor all applications and correlate usage to business outcomes to determine and refine best practices. For example, a successful branch office could be heavy users of LinkedIn, Salesforce.com and Twitter. In aggregate, these might not be among the company’s top 10 applications, and the usage would fly under the radar. If organizations could monitor applications and then link consistent success to specific usage patterns, unknown best practices can be discovered and mapped across the entire user population.

Using mean time to repair (MTTR) to measure IT resolution success
ZK Research studies have revealed a few interesting data points when it comes to solving issues. First, 75% of problems are actually identified by the end user instead of the IT department. Also, 90% of the time taken to solve problems is actually spent identifying where the problem is. This is one of the reasons I’m a big fan of tools that can separate application and network visibility to laser in on where exactly a problem is. This minimizes “resolution ping pong,” where trouble tickets are bounced around IT groups, and enables IT to start fixing the problem faster. If you want to cut the MTTR, focus on identification instead of repair, as that will provide the best bang for the buck.

Managing capacity reactively
Most organizations increase the capacity of servers, storage or the network in a reactive mode. Don’t get me wrong, I know most companies try to be proactive. However, without granular visibility, “proactive” often refers to reacting to the first sign of problems, but that’s often too late. Instead, IT departments should understand how to establish baselines and monitor how applications deviate from the norm to predict when a problem is going to occur. For example, a baseline could be established to understand the “normal” performance of a business application. Over four successive months, the trend could be a slight degrade of the application’s performance month after month. No users are complaining yet, but the trend is clear, and if nothing is done, there will be user problems. Based on this, IT can make appropriate changes to the infrastructure to ensure users aren't impacted.

The IT environment continues to get more complex as we make things more virtual, cloud-driven or mobile. It’s time for IT to rethink the way it operates and leverage the network to provide the necessary visibility to stop wasting money on the things that don’t matter and start focusing on issues that do.



Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com


Wednesday, February 12, 2014

Microsoft offers multifactor authentication to Office 365 users

Since June last year, users with administrative roles had the facility

Microsoft is offering multifactor authentication free as an option to all users of the enterprise versions of Office 365 suite, a hosted set of Microsoft Office tools and applications. It will be available to users of Office 365 Mid-Size Business, Enterprise, and other plans, but not to consumer or small business editions.

The company also plans to add multifactor authentication for Office 2013 client applications, with native multifactor support for applications such as Outlook, Lync, Word, Excel, PowerPoint, PowerShell, and OneDrive for Business, planned for release later this year, Paul Andrew, technical product manager on the Office 365 team, wrote in a blog post Monday.

Microsoft also plans to integrate third-party multifactor authentication systems and smart cards such as the Common Access Card of the U.S. Department of Defense and the U.S. federal Personal Identity Verification card.

Multifactor authentication has been available for Office 365 administrative roles since June last year.

The multifactor authentication requires the user to enter other authentication factors besides the basic password. These could include mobile phones, biometric verification or a personal identification number. "The multifactor authentication increases the security of user logins for cloud services above and beyond just a password," Microsoft said. Office 365 administrators can enroll users for multifactor authentication through the Office 365 admin center.

The company said in September it was offering multifactor authentication on its Windows Azure cloud platform, whereby in addition to an user name and password, users can authenticate through an application on their mobile device, automated voice call, or a text message with a passcode.

The authentication for Office 365 ranges from acknowledging a phone call, entering a six-digit code sent by text message on the portal to confirmation through apps on smartphones, Microsoft said. "Only after this second authentication factor has been satisfied can a user sign in," it added.

Microsoft is also adding App Passwords for users so they can authenticate from Office desktop applications as these are not yet updated for multifactor authentication. Once the users have logged in with multifactor authentication, they will be able to create one or more App Passwords, which are 16-character randomly generated passwords, for use in Office client applications.

The company is offering multifactor authentication for Office 365 to midsize business, enterprise plans, academic plans, nonprofit plans, and standalone Office 365 plans, including Exchange Online and SharePoint Online. Organizations on these subscriptions can use the service for free.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Monday, February 10, 2014

What's the price of not upgrading from Windows XP?

Microsoft and its hardware partners really, really want everyone to abandon Windows XP by April 8. But the world won't end if you don't.

It's the end of an era at Microsoft. No, I'm not talking about CEO Steve Ballmer retiring and being replaced by Satya Nadella, though that also qualifies. I'm referring to the imminent "death" of support for Microsoft's long-running Windows XP operating system.

Microsoft -- and its hardware partners like HP, Dell, and many others -- really, really, really want you and everyone else to upgrade to Windows 8.1, or at least Windows 7. In hopes that Windows XP upgrades will save the PC industry, they're pulling out all the stops, from warning of potential security catastrophes to offering discounts and special financing on new hardware, along with a wide variety of assessment tools and migration services designed to ease the process. They're even inviting small groups of journalists to dinner to discuss the issue!

Is April 8 the new Y2K?
The efforts seem to be working for enterprises. Jordan Chrysafidis, Microsoft's vice president of OEM worldwide marketing, said that only 10% of enterprises in the developed world still use XP exclusively -- although he also said that 24% of small businesses don't even know that XP is reaching its end-of-service date. Either way, though, its pretty clear that not everyone is going to upgrade by the April 8 support cut-off.

Like other tech scares dating back to Y2K, that may not cause an immediate disaster.
Don't get me wrong, I'm totally behind the upgrade push. Windows XP is ancient, and no longer delivers a state-of-the-art computing experience -- it was designed long before touch and the cloud and mobility and virtualization and modern management techniques took center stage. XP users can't hope to take advantage of modern trends and cope with today's threats.

But that's the point. Failing to upgrade from Windows XP is more about forgoing the advantages of modern technology than it is about some arbitrary doomsday. Things aren't going to be dramatically different for XP users on April 9 than they were on April 7 -- though they're likely to get worse over time. It's just that XP users will be leaving the promise of the 21st Century on the table.

According to Chrysafidis, for example, one recent study showed that upgrading to Windows 7 or 8.1 can save $700 per year per user -- one more argument for using a modern OS. But it's also hardly an imperative to make the switch by any specific date, or for every machine in every application to be instantly upgraded.

XP is everywhere
Windows XP was incredibly popular and remains deeply ingrained in machines of all types used for all sorts of purposes. (Heck, I've still got an old netbook running XP.) XP is found in millions of small business, retail outlets, and factory floors, and the upgrade usually isn't just swapping in a new operating system. In many cases, you'll need brand new hardware and have to upgrade proprietary apps that don't work on other versions of Windows (most packaged apps are compatible). That's simply not top of mind -- or budget -- for many users and organizations. Again, the new hardware is going to be way better, cheaper, and more reliable than the old XP boxes it replaces, but you already own the XP machines, so that's not always a useful comparison.

As Chrysafidis pointed out, upgrading from XP is a great opportunity to remake outmoded business processes as well as replace hardware and software. But that's a big deal that requires serious planning -- it doesn't make sense to tackle a major project like that on Microsoft's timetable. Waiting carries risks -- security breaches or aging hardware giving up the ghost at an inopportune moment -- but so does rushing into an upgrade process you're not ready for or can't afford.

No excuse not to upgrade
Yes, you're going to have to upgrade from Windows XP, and sooner is better than later. But if you ask me, it's more important to do it right than to do it fast. Far better to leverage the opportunity to truly take advantage of what modern technology has to offer than scramble to meet the April 8 deadline just to end up doing the same old things on a shiny new PC with a shiny new operating system. (As long as you don't get hacked in the meantime, of course.)

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Wednesday, February 5, 2014

4 Mistakes to Avoid When Your Business Gets Bashed Online

When a company gets a bad customer review on Yelp, Facebook, Twitter or any other social network, emotions can run high, because real damage to its reputation and sales can result.

The business owner usually has a knee-jerk reaction and responds in kind by attacking the offending customer with an emotionally charged online response.

Some businesses might take the opposite approach and choose the other extreme -- no response at all. By simply ignoring the bad review, a company hopes it will dissipate into the Internet ether, whereas a response might ignite a social media storm and cripple the company publicly.

But both the emotionally charged response and the ignore-it-at-all-costs response are big mistakes, says CEO Jay Shek at Locality, a search engine for local businesses that taps into ratings and review information from Yelp.

The better response is a measured one where you reach out to the upset customer offline and try to fix the situation. The result of this effort, good or bad, can be relayed online. The goal is to show readers of the bad review that your company is proactive when it comes to improving products and services.

Shek has seen his share of responses to bad reviews and has come up with four common mistakes companies make. There are exceptions, of course, that call for special responses. For instance, if competitors or critics pretending to be customers are writing bad reviews, as in a recent case concerning Yelp reviewers, then legal action may be required. Generally speaking, though, Shek's list of common mistakes apply to most situations.

Mistake 1: Countering With Fake Positive Reviews
Some companies will try to flood the social site with positive reviews, in hopes of blunting the sting of a critical one. A quick Google search on fake reviews will uncover a cottage industry of marketing firms specializing in producing them. But by doing so, a company runs the risk of getting caught and being publicly shamed.

Odds of getting caught are increasing, too. Review sites such as Yelp are getting better at sniffing out fake reviews. Web filters help identify fake reviews coming from the same accounts. Consumers, too, can often spot fake reviews by the way they're written: They are typically overly positive, not a lot of detail about the business, a generic feel.

Last October, Samsung was fined $340,000 for hiring writers and two marketing firms to post fake reviews in Taiwanese forums, both positive ones for Samsung products and critical ones for competitors' products.

Mistake 2: Overreacting Publicly
Smaller retailers tend to overreact emotionally to a critical review, whereas a larger company's marketing pros are usually more seasoned and level-headed. Yelp is awash with small business owners ranting against customer criticism, but it only makes them look small, petty and, of course, unprofessional.

"It's natural to react emotionally, but you can't let that come through," Shek says. "Reacting negatively reflects even worse on your business than the initial negative review."

With a single, opinionated critical review -- as in, "the lasagna was terrible" -- you might not want to react at all, because there's not much to do anyway. With other critical reviews, a response should at the very least acknowledge the customer's frustration, as well as ways to fix the situation.

Mistake 3: Being Too Passive
As noted earlier, some companies will ignore negative customer reviews. But online reviews are the new customer surveys and comment cards. They're a form of feedback from your customers. Companies pay thousands of dollars for this kind of research. "Now customers are giving you this for free," Shek says. "You shouldn't ignore it just because you think it's unjust or exaggerated."

This doesn't necessarily mean you have to respond to every critical review. However, you should constantly check for patterns. For instance, if many customers are agreeing that the lasagna is terrible, then the you might want to make changes to the recipe.

Mistake 4: Making a Quick Fix
When reacting to a critical review, the initial outreach should be done offline, because online comments can get snippy. An offline conversation with the critical reviewer affords a chance to really understand the issue and work to resolve it.

This is much better than a blanket fix, such as immediately giving any critical reviewer a 30 percent discount on their next purchase. "You don't want to train consumers to complain in order to get discounts and free stuff," Shek says.

Once a resolution has been worked out, you can post the results online. "Whether or not you've made the customer happy, the fact that you were open and honest about the problem and tried to address it increases your reputation online."

A lot of times the critical reviewer will be appreciative of your efforts and, in turn, post a positive comment. That's how a bad review can be made into a great marketing message.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com