Free Essay

Message to Operator

In:

Submitted By Olof
Words 268
Pages 2
Hiho
I am currently having some technical issues with my mobile operator. I cannot make calls with the phone, it says that I should contact my provider. I have been trying to get in contact with you for the last couple of days. I would sincerely appreciate if you could take your time to solve these issues for me. However, there are some positive things that I would like to share with you. First of all, I have been a customer at your company for several years and I have never encountered any problems which I am very grateful for. Secondly, I am very surprised to learn that you get more discounts of your product depending on how long you have been a customer. Still, there are some important points that I would like you to look over. I think the support could be improved since I find it difficult to get in contact with you, through email. I believe it would improve your service in the future. One solution would be to hire more people who can be responsible for the support. I definitely recommend it. But you have to consider if it is worth the time and effort, perhaps you may think it’s more important to prioritize something else.
I hope you will give this matter your urgent attention and do what you think is necessary to ensure this mistake is not repeated. Once again, I am glad I use your service and I will continue to work with you, as long as there are no further issues. I look forward to hearing from you soon

Similar Documents

Free Essay

Sorry

...The Basics of SMS Messaging The Basics of SMS Messaging Introduction to SMS Short Message Service, better known as SMS or text messaging, is a telecommunications service that allows the sending of short (160 characters or less) text-based messages between mobile phones. SMS is generally available on all wireless networks globally and can reach virtually all of the 4 billion mobile phones in use today, making it the world’s most pervasive data communications technology. SMS messages can be typically sent and received within seconds throughout the world. And with more than 1 trillion SMS messages sent in 2009 in the US alone, volumes are widely forecast to continue their strong growth rate globally for years to come. SMS offers businesses a compelling communication channel for effective, two-way interaction with customers and prospects. It can extend brand awareness, create customer loyalty and deliver timely content or critical information, providing the immediacy and interactivity no other medium can offer. Attracted by the unique characteristics offered by SMS, businesses are increasingly utilizing the anytime, anywhere mobile channel as part of a multichannel communication strategy. Types of SMS Person-to-Person (P2P) and Application-to-Person (A2P) are the two categories of SMS messages. While P2P messages connect one individual to another, A2P messages are used by companies that want to interact with consumers via an SMS application. This document deals solely with...

Words: 1858 - Pages: 8

Free Essay

Asdas

...Services. 22 Cable. 22 Pager. 23 Civil Communications. 23 Military Communications. 23 Amateur Radios. 23 Private/Commercial Communications. 23 Marine and Aeronautical Communications. 23 Citizens Band (CB) 24 THE ICOM 718 High Frequency (HF) general coverage radio 25 The Main Components of a Typical HF Radio Station: 26 Operating Modes 27 SIMPLEX OPERATION 27 DUPLEX OPERATION VIA REPEATER 27 Radio Relay/Rebroadcast 28 Extending Range 28 Linked Repeater System 29 Proper Use of Repeaters. 30 Radio checks, Signal strength and Readability 31 Preliminary Calls 31 OPERATIONAL INFORMATION 33 INCOMING RADIO MESSAGES 33 INCOMING TELEPHONE MESSAGES 34 OUTGOING MESSAGES 34 RECEPTION OF DISTRESS, URGENCY AND SAFETY MESSAGES 35 Sample Message Form 36 Calling Procedures 37 Collective calls and Radio check 38 Lost Communications Procedure. 39 Communications Electronic Instructions (CIE) 39 Call Signs 40 Caribbean Country Prefixes 41 Phonetic Alphabet 42 Time Conversion Chart 43 NOTES 44 Introduction: The Importance of Communication The entire world is either wired or wrapped within the web of an overwhelming communication environment. Whether it is the plain old telephone system...

Words: 9300 - Pages: 38

Free Essay

E-Banking: ‘a New Era of Customer Satisfaction Through Sms Banking’

...close to 400 mobile operators in over 133 countries who are signing up 4 to 6 new customers every second. That means people are now much more interested in cell phone than before. Users always seek multi-dimensional use of their cell phones. The main purpose of this paper is to find out customer satisfaction through SMS Banking. Mobile phone operators provide various value added services (VAS) to their users including banking service and other utility services with the legal agreement with respective organizations. As mobile operators are trying heart and soul to retain existing customers and enhance new customers by adding VAS, hence a mobile banking solution called SMS Banking that allows people to bank with their mobile phones and its overview are presented in paper. Introduction There are various types of E-banking that are used in the field of IT and Banking. SMS Banking is one of them. SMS stands for ‘Short Message Service’. SMS Banking allows you to check account balance, transfer amount to other account, payment of utility bills like electricity bill, gas bill and water bill etc. Short Message Service is particularly adapted to 2G networks because they require low capabilities for data exchange (160 characters for 7 bit by message). For example, SMS make possible to answer quickly a customer request to consult the account balance. The sensitivity of this information requires that the bank lodges and manages its own SMS server since the telecom operators are not authorized...

Words: 3779 - Pages: 16

Free Essay

My Work

...FCC Commercial Element 1 Question Pool (approved 25 June 2009) Subelement A – Rules & Regulations: 6 Key Topics, 6 Exam Questions Key Topic 1: Equipment Requirements 1-1A1 What is a requirement of all marine transmitting apparatus used aboard United States vessels? A. Only equipment that has been certified by the FCC for Part 80 operations is authorized. B. Equipment must be type-accepted by the U.S. Coast Guard for maritime mobile use. C. Certification is required by the International Maritime Organization (IMO). D. Programming of all maritime channels must be performed by a licensed Marine Radio Operator. 1-1A2 What transmitting equipment is authorized for use by a station in the maritime services? A. Transmitters that have been certified by the manufacturer for maritime use. B. Unless specifically excepted, only transmitters certified by the Federal Communications Commission for Part 80 operations. C. Equipment that has been inspected and approved by the U.S. Coast Guard. D. Transceivers and transmitters that meet all ITU specifications for use in maritime mobile service. 1-1A3 Small passenger vessels that sail 20 to 150 nautical miles from the nearest land must have what additional equipment? A. Inmarsat-B terminal. B. Inmarsat-C terminal. C. Aircraft Transceiver with 121.5 MHz. D. MF-HF SSB Transceiver. 1-1A4 What equipment is programmed to initiate transmission of distress alerts and calls to individual stations? A. NAVTEX. B. GPS. C. DSC controller...

Words: 8813 - Pages: 36

Free Essay

Paper Describes About 4g and Lte

...ericsson White paper 284 23-3163 Uen | February 2012 Voice and video calling over LTE a step towards future telephony The GSMA IR.92 voice-over-LTE and GSMA IR.94 IMS conversational video specifications are the preferred industry choices for mass-market voice and video calling services over LTE, satisfying user expectations and providing the most advantageous solutions for operators. The specifications profile existing 3GPP IMS services, enhanced packet core and radio, and leverage telecom characteristics such as quality of service and global reach. VOICE services in MOBILE BROADBAND networks Mobile broadband has created a world of opportunities and opened up new revenue streams for operators. Opportunities are often coupled with challenges, and mobile broadband tests the position of communication services, such as voice, which today accounts for around 70 percent of operators’ annual revenue – about USD 650 billion – globally. The crucial question is how to take advantage of mobile broadband opportunities while at the same time maintaining and increasing revenue from communication services. LTE networks can deliver mobile broadband and communication services with greater capacity and lower latency. However, as there is no circuit-switched voice domain in LTE, the mobile industry will adopt a globally interoperable IP-based voice, video-calling and messaging solution for LTE, which also enables development of new innovative multimedia services. Some over-the-top (OTT)...

Words: 5307 - Pages: 22

Premium Essay

Business

... What was the message? I need you to clean the wooden parts around your booths. What channel was used to send the message? Face To Face communication. What was the misunderstanding that occurred? At first, it doesn’t seem there was any misunderstanding, However, the co-worker that checked the section to see if the wood was cleaned forgot to specify that the wooden rails around the window around the booths also needed to be wiped down and cleaned/ How could the misunderstanding have been avoided? The co-worker should have been more specific on what needed to be cleaned. Who was the Sender? Customer Who was the receiver? Phone operator What channel was used to send the message? Communication technology. What was the message? Why was he being charged so much for a large pizza and soda. He ordered one large pizza and 2 liter and I’m being charged 28 dollars. Pizza are ten dollars for any pizza. What was the misunderstanding that occurred? The customer is being charged 28 dollars for one pizza and soda. The phone operator started to panic and kept telling the customer she does not know why its that much but that is the price. After a few minutes, another person got on the phone to see if they can fix the problem and finally this person saw that the phone operator had pushed in two pizza instead of one. How could the misunderstanding have been avoided? First, the phone operator should not have...

Words: 458 - Pages: 2

Free Essay

How to Get Cft Partner with Awk

...Introduction 2.1 What is SOAP/WSDL? . . . . . . . . . . . . . . . . . . 2.2 SOAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 WSDL . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4 How do I access the Service Manager SOAP service? 2.5 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 SOAP in Perl 3.1 What options are there for SOAP/WSDL client-side 3.2 Building a Perl client . . . . . . . . . . . . . . . . . . 3.3 SOAP::Lite — putting stuff in . . . . . . . . . . . . . 3.4 SOAP::SOM — getting stuff back out . . . . . . . . . 3.5 SOAP::Data — calling parameters . . . . . . . . . . . 3.6 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . 4 HP 4.1 4.2 4.3 4.4 4.5 Service Manager Tickets Contacts and operators . . . . . . . . Interaction tickets and their lifecycle Incident tickets and their lifecycle . . Change tickets and their lifecycle . . Exercise . . . . . . . . . . . . . . . . . 1 3 4 10 16 26 28 29 30 33 34 41 48 50 51 52 55 62 64 67 68 69 71 76 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . in Perl? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Creating Tickets 5.1 Common fields . . . . . . . . . . . . . ...

Words: 11969 - Pages: 48

Premium Essay

Engineering Economics

...dictonaries, lists of terms, terminology, etc. all forms of the term, whether spelled as a single word, a phrase, or hyphenated definitions of the word imbroglio from the Web Meaning Type Into Search Box (& Results) Calculator Operators +–*/ % of ^ or ** old units in new units basic arithmetic percentage of raise to a power convert units 12 + 34 - 56 * 7 / 8 45% of 39 2^5 or 2**5 300 Euros in USD, 130 lbs in kg, or 31 in hex Restrict Search Operators Meaning Type Into Search Box (& Results) city1 city2 site: [#]..[#] filetype: (or ext:) link: Book flights. Search only one website or domain. Search within a range of numbers. Find documents of the specified type. Find linked pages, i.e., show pages that point to the URL. Meaning sfo bos (Book flights from San Francisco (SFO) to Boston (BOS).) Halloween site:www.census.gov (Search for information on Halloween gathered by the US Census Bureau.) Dave Barry pirate 2002..2006 (Search for Dave Barry articles mentioning pirates written in these years.) Form 1098-T IRS filetype:pdf (Find the US tax form 1098-T in PDF format.) link:warriorlibrarian.com (Find pages that link to Warrior Librarian's website.) Type Into Search Box (& Results) Specialized Information Queries Operators book (or books) define, what is, what are define: movie: stocks: weather book Ender's Game (Show book-related information. Note:...

Words: 936 - Pages: 4

Free Essay

Cririque on Surrogates

...Critique on Surrogates Robert Piccioli English 225 Brian Davis September 12, 2011 Critique on Surrogates The film Surrogates (2009), directed by Jonathon Mostow, was an excellent film with a powerful message for society. The message was delivered well through each aspect of the film and its elements. The film's main concept centers around the mysterious murder of a college student linked to the man who helped create a high-tech surrogate phenomenon that allows people to purchase remote controlled humanoid robots through which they interact with society. These fit, good-looking, remotely controlled robots ultimately assume their life roles, enabling people to experience life vicariously from the comfort and safety of their own homes. Online, you can hide behind an avatar and a lie of a profile and have complete anonymity.  Expand that to real life, with a realistic looking robotic body, made in your own image, or not, and you have the world of "Surrogates."  Most crime being a thing of the past, no more spreading diseases, racism and sexism gone and few, if any , consequences for your actions, (destroying a surrogate seems to be considered vandalism) all seem to take our own self centered, hedonistic, world of instant gratification to a whole new level.  Throw in those who don't choose to keep them selves 'safe' by using robotic bodies living on reservations, seemingly shunning technology and being the subject of new racism, and you might think that you have a...

Words: 1771 - Pages: 8

Premium Essay

Let Us C - Yashwant Kanetkar.Pdf

...Let Us C Fifth Edition Yashavant P. Kanetkar Dedicated to baba Who couldn’t be here to see this day... About the Author Destiny drew Yashavant Kanetkar towards computers when the IT industry was just making a beginning in India. Having completed his education from VJTI Mumbai and IIT Kanpur in Mechanical Engineering he started his training company in Nagpur. Yashavant has a passion for writing and is an author of several books in C, C++, VC++, C#, .NET, DirectX and COM programming. He is a much sought after speaker on various technology subjects and is a regular columnist for Express Computers and Developer 2.0. His current affiliations include being a Director of KICIT, a training company and DCube Software Technologies, a software development company. In recognition to his contribution Microsoft awarded him the prestigious “Best .NET Technical Contributor” award recently. He can be reached at kanetkar@kicit.com. Preface to the Fifth Edition It is mid 2004. World has left behind the DOTCOM bust, 9/11 tragedy, the economic downturn, etc. and moved on. Countless Indians have relentlessly worked for close to two decades to successfully establish “India” as a software brand. At times I take secret pleasure in seeing that a book that I have been part of, has contributed in its own little way in shaping so many budding careers that have made the “India” brand acceptable. Computing and the way people use C for doing it keeps changing as years go by. So overwhelming...

Words: 46379 - Pages: 186

Premium Essay

Let Us C

...Let Us C Fifth Edition Yashavant P. Kanetkar Dedicated to baba Who couldn’t be here to see this day... About the Author Destiny drew Yashavant Kanetkar towards computers when the IT industry was just making a beginning in India. Having completed his education from VJTI Mumbai and IIT Kanpur in Mechanical Engineering he started his training company in Nagpur. Yashavant has a passion for writing and is an author of several books in C, C++, VC++, C#, .NET, DirectX and COM programming. He is a much sought after speaker on various technology subjects and is a regular columnist for Express Computers and Developer 2.0. His current affiliations include being a Director of KICIT, a training company and DCube Software Technologies, a software development company. In recognition to his contribution Microsoft awarded him the prestigious “Best .NET Technical Contributor” award recently. He can be reached at kanetkar@kicit.com. Acknowledgments It has been a journey of almost a decade from the stage the book idea of “Let Us C” was conceived up to the release of this Fifth Edition. During this journey I have met so many students, developers, professors, publishers and authors who expressed their opinions about Let Us C. They have been the main motivators in my effort to continuously improve this book. In particular I am indebted to Manish Jain who had a faith in this book idea, believed in my writing ability, whispered the words of encouragement and made helpful suggestions...

Words: 46651 - Pages: 187

Free Essay

C Book

...Let Us C Fifth Edition Yashavant P. Kanetkar Dedicated to baba Who couldn’t be here to see this day... About the Author Destiny drew Yashavant Kanetkar towards computers when the IT industry was just making a beginning in India. Having completed his education from VJTI Mumbai and IIT Kanpur in Mechanical Engineering he started his training company in Nagpur. Yashavant has a passion for writing and is an author of several books in C, C++, VC++, C#, .NET, DirectX and COM programming. He is a much sought after speaker on various technology subjects and is a regular columnist for Express Computers and Developer 2.0. His current affiliations include being a Director of KICIT, a training company and DCube Software Technologies, a software development company. In recognition to his contribution Microsoft awarded him the prestigious “Best .NET Technical Contributor” award recently. He can be reached at kanetkar@kicit.com. Acknowledgments It has been a journey of almost a decade from the stage the book idea of “Let Us C” was conceived up to the release of this Fifth Edition. During this journey I have met so many students, developers, professors, publishers and authors who expressed their opinions about Let Us C. They have been the main motivators in my effort to continuously improve this book. In particular I am indebted to Manish Jain who had a faith in this book idea, believed in my writing ability, whispered the words of encouragement and made helpful suggestions...

Words: 46741 - Pages: 187

Free Essay

Botnet

...DCIT 65 - Web Development Botnet Edrilyn R. Fortuno BS IT 3 - 1 February 7, 2013 Botnet A botnet is a collection of computers that connected to the internet that interact to accomplish some distributed task. A bot is a type of malware that enables a network attacker to gain control over a computer and utilize it to launch third party attacks on the Internet. Software agents, or robots, that run autonomously and automatically. A group of computers running a computer application controlled and manipulated only by the owner or the software source. In the past, the concept of bots did not include harmful behavior by default.Bots can be very benecial programs when they are designed to assist a human user, either by automating a simple task, or by simplifying a user's control over various programs or systems. Botnets are used for malicious activity like distributed denial of service attacks, identity theft, sending spams and phishing attacks. Typically botnets used for illegal purposes. Botnets are seen to be one of the main sources of malicious activity. Rapidly growing botnets and new methods for spreading malicious codes and launching attacks. Bots sneak into a persons computer in many ways. Bots often spread themselves across the Internet by searching for vulnerable, unprotected computers to infect. When they nd an exposed computer, they quickly infect the machine and then report back to their master. Their goal is then to stay hidden until they are instructed to carry...

Words: 1041 - Pages: 5

Premium Essay

Buyer Personas

...BUYER CHARACTERISTICS Name: | Guy Fieri | Industry Segment: | Restaurant – Full-Service – Mid-size to large independent and multi-unit | Job Titles: | Owner/Operator | Reports To (Titles): | Self | Age Range: | 40+ | Predominant Gender: | Male | Years on the Job: | 10+ | Education: | Bachelors Degree | BUYER’S FIVE MOST IMPORTANT ACTIVITIES (in order of importance): 1. Filling as many tables as possible on a daily basis (with either repeat clients or new clients) 2. Ensuring a consistent level of quality experience for every client, every time 3. Training and managing staff 4. Marketing to existing and new clients TOP FIVE OBSTACLES OR PROBLEMS THAT INTERFERE WITH THE BUYER’S SUCCESS: 1. Traditional marketing like print ads and mailers are expensive and don’t guarantee any measurable ROI. E-mail marketing is better, cheaper, and definitely has its place. However, only a few percent of e-mails are ever opened, and many of my customers do not want to give out their e-mail addresses for fear of more SPAM. 2. My inability to quote accurate wait times for walk-in and call-ahead parties, while simultaneously ensuring that reservations are seated at the time they requested, during peak hours negatively impacts my customers’ satisfaction. 3. Taking reservations by phone with pen & paper by phone is inefficient, requires that someone is available at all hours of the day (even when we’re closed), and is prone to human error. Using reservations...

Words: 1585 - Pages: 7

Premium Essay

Helpfull`

...with an authorized capital of Tk.20,000,000,000 being the only government sponsored mobile telephone company in the country. On the same day the Company obtained Certificate of Commencement of Business. They continue to grow and engage their customers through their clear commitment to offering high quality products and services as well as leading customer retention and loyalty programmers. Teletalk continues to be a part of the revolution that’s connecting millions of Bangladeshi people and around the world. Teletalk Bangladesh limited was established keeping a specific role in mind. Teletalk has forged ahead and strengthened its path over the years and achieved some feats truly to be proud of, as the only Bangladeshi mobile operator and the only operator with 100% native technical and engineering human resource base, Teletalk thrives to become the true people’s phone – “Amader Phone”. Basic objectives for which the Company was formed are highlighted here under: • To provide mobile telephone service to the people from the public sector • To ensure fair competition between public and private sectors and thereby to safeguard public interest • To meet a portion of unmitigated high demand of mobile telephone • To create a new source of revenue for the government strategic issues The main three problems of teletalk are 1. poor quality service . 2. in appropriate marketing strategy. 3. bureaucratic structure So by analyzing these problems we...

Words: 2721 - Pages: 11