Posts

Showing posts from January, 2025

L1, L2, and L3 Support Explained

Image
  L1, L2, and L3 Support Explained In IT and software support, L1 (Level 1), L2 (Level 2), and L3 (Level 3) represent different tiers of technical support, each handling issues of varying complexity. 1️⃣ L1 Support (Level 1 - Frontline Support) Role: First point of contact for users/customers Responsibilities: Handles basic issues such as password resets, user access, and general troubleshooting. Uses a knowledge base or predefined scripts to resolve common problems. Escalates complex issues to L2 if not resolved. Communicates with customers via phone, chat, or email. Records tickets in a helpdesk system (e.g., ServiceNow, Jira, Zendesk). 🔹 Example: A user is unable to log in due to incorrect credentials → L1 resets the password. 2️⃣ L2 Support (Level 2 - Technical Support) Role: More in-depth troubleshooting and problem-solving Responsibilities: Resolves moderate to complex technical issues that L1 cannot handle. Analyzes logs, configurations, and system...

Default Value vs. Current Value in Dynamics 365 CE: Key Differences

Image
In Dynamics 365 CE (Customer Engagement), environment variables are used to manage configuration settings for solutions. When dealing with environment variable definitions and their associated values , the terms default value and current value serve distinct purposes: 1. Default Value : The default value is a predefined setting or fallback value assigned to the environment variable at the solution level . It acts as the base value or the initial value when: The solution is imported into a new environment. There is no custom configuration applied to override it. It is set during solution design and helps ensure the solution works out of the box even if no customizations are applied to the variable. Example Use Case : If an environment variable is used to store an API endpoint URL, the default value might be set to a test or staging environment URL in the unmanaged solution. 2. Current Value : The current value is the runtime value or the active configuration value as...

Book Review: The Go Getter by Peter B Kyne

Image
When I was making a list of new books to read next year, I found several recommendations for The Go-Getter by Peter B. Kyne. I ordered the book on Amazon, and when it arrived, I saw it was only 76 pages long—short enough to finish in one sitting. This made me curious, so I looked up more information about the book. Published in 1921, The Go-Getter was not originally intended to be a guide for business or success, but it has become a classic in those areas. The Go-Getter is an inspiring story about determination and a can-do attitude. It follows Bill Peck, a war veteran, who works relentlessly to secure a job with a big company. Through his ambition, honesty, and perseverance, Peck not only meets expectations but exceeds them. In the story, Peck convinces Cappy Ricks, the founder of Rick’s Logging & Lumbering Company, to give him a tough challenge: selling skunk wood in unusual lengths—a job destined for failure. Peck not only meets his quota but impresses Ricks, who then gives...

Book Review: Homo Deus: A Brief History of Tomorrow by Yuval Noah Harari

Image
Yuval Noah Harari is a renowned author, widely recognized across the globe, with his books now found in many households and libraries. While he has authored several works, Homo Deus is the first of his books that I’ve read. This thought-provoking and informative book presents new insights, often drawing parallels with past events, and offers fresh perspectives that sparked many new ideas and reflections in my mind. The book starts with the concept of the New Human Agenda, where the author argues that, despite thousands of years of progress, humanity's fundamental questions remain the same. In the past, issues such as famine, plague, and war were caused by nature; today, however, many of these problems are the result of human actions. Sugar is now more dangerous than gunpowder : Yuval Noah Harari The author suggests that the pursuit of happiness is humanity's second agenda. Throughout history, happiness has been defined in various ways. In the book, the author discusses how thi...

Power BI Model Security Demystified: Ensuring Confidentiality

Image
 Access restriction for analytics reports is critical for maintaining the security, accuracy, and utility of data.. Access restriction for analytics reports is crucial for safeguarding data security, ensuring compliance, enhancing data governance, and supporting informed decision-making. Without it, organizations risk exposing sensitive data, violating regulations, and making poor decisions due to data inaccuracies or misuse. In Power BI, reports are stored in workspaces. When you create a workspace, only you can access it at first. You can control who else can access your workspace by clicking the  Manage access  button in the workspace view.   There are four types of roles in a workspace:   Viewer : Can only look at and read the reports.   Contributor : Can add reports to the workspace, as well as copy, edit, delete, and update dashboards.   Member : Can add Contributors and Viewers and manage permissions for datasets in the work...