Trending December 2023 # Three Ways Developers Can Deal With Tough Customers # Suggested January 2024 # Top 14 Popular

You are reading the article Three Ways Developers Can Deal With Tough Customers updated in December 2023 on the website We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested January 2024 Three Ways Developers Can Deal With Tough Customers

We all know that lighting matches near a combustible substance like gasoline is not a good idea. Yet people go up in smoke every year.

Similarly, putting a developer and a customer in the same room can have a combustible effect. Many developers tend to be very direct, and talk in technical terms the customer can’t comprehend. They sometimes have very little patience for customers who send mixed message about their requirements.

As a result, many developers (and their projects) go up in smoke every year as well.

The fact is, developers are taught how to write code – NOT how to deal with customers. Over the years, I have worked with many different types of customers and have learned that each customer has a different way of working, different expectations and, frankly, different temperaments.

That seems obvious enough, yet developers – even seasoned ones – sometimes look past the interpersonal aspects of dealing with customers.

I have written about why managers may want to think twice about having developers talk directly to customers. However, there are many developers that are quite good at interpersonal communications.

In fact, when a developer has the combination of strong functional understanding of the business they support and a deep technical expertise, the result can be a deep level of confidence and trust with their customer.

When Kenny Chesney sings about how a boy and girl can be like matches and gasoline in “Ain’t Back Yet,” the implication is that the results can be both good and bad. And as in romantic relationships, understanding how to deal with different personalities can impact the outcome of business relationships.

Therefore it is important to recognize that when you are dealing with a customer, you are building a relationship. It could end very badly if lines in the sand are drawn. Or it could result in a long congenial relationship when common ground is found.

I’m not overlooking the fact that a developer without the required technical skills to get the job done isn’t worth too much. But I would argue that a developer that doesn’t have the necessary people skills to work with different types of customers is not worth a whole heck of a lot more.

A more dynamic developer is one that can handle the bits and bytes, as well as handle a customer that is unaware their attitude is submarining a project.

It’s not always as simple as asking the customer questions about how they want a system configured or how they want a change coded. A well-rounded developer will have the people skills to deal with all kinds of personalities and be able to make the resulting technical changes that put a smile on the customer’s face.

Here are three types of customers that are exceedingly challenging and some ideas on how to best deal with them.

Nothing gets past these customers – which is both good and chúng tôi tend to focus on the excruciating detail of every requirement and outcome, often providing a lot of overbearing guidance and suggestions that can make you wish they could write the code themselves, because it seems like you’ll never get it right.

On the other hand, working with these types of customers can provide some unique learning opportunities, since they have often developed extensive knowledge and understanding of their particular systems and environment. Often, a big challenge here is to get them out of the weeds enough to focus on the bigger and longer term picture around what they are trying to accomplish.

If you go the extra mile and provide more relevant and insightful detail than usual, you will go a long way to improving their level of satisfaction.

You're reading Three Ways Developers Can Deal With Tough Customers

4 Ways You Can Automate Your Home With Smartphone

1. Unlock Doors

Keys may grant you access to your home, but they don’t give you complete control. That’s what a smartphone is for. With that 5-inch touchscreen, you can turn off the lights when you’re away, turn on the TV, cut power to various appliances, and, yes, unlock the front door without needing a key. Doing so doesn’t come cheap, but it’s a surprisingly easy task. So if you’re ready to make the investment, here are multiple ways to control your home from anywhere using your phone.

The front door is one of the first things visitors will notice, and if you’re seeking to impress others, this is where to start. The Kevo Kwikset Bluetooth-enabled door lock lets you turn your smartphone into a key. Just tap your finger against the ring around the keyhole, and if your phone is within range, it will open the door for you.

2. Manage Power Outlets

Belkin has an entire line of products under its WeMo brand that give you remote control over power outlets, light switches, and more. Just install the app onto your smartphone and plug a WeMo Switch into whichever outlet you want to control. You can then toggle that outlet regardless of whether or not you’re home. This is great if you’re thirty minutes away from home and just realized you left the hall lamp on. Likewise, it’s a great way to scare the pants off of house guests. If you then want the lights to come on automatically when you get back, be sure to pick up a WeMo Switch + Motion.

3. Adjust Thermostats

While you’re at it, don’t forget about heating and cooling. Traditional thermostats let users set the temperature manually, and some even let them designate different levels for the various times of the day. But the Nest thermostat takes things even further. This “thinking” thermostat learns your preferences over time, and when it’s off the mark, you can control it remotely using, you guessed it, your mobile phones.

4. Boil Water

If you just have to have a hot cup of tea before leaving the house in order to be a functional member of society, iKettle might just shave a few minutes off your morning routine. This electric kettle pairs with a mobile app that can serve as your alarm clock each morning. It will wake you up and ask if you want iKettle to warm up water for you. Go ahead and say yes. The kettle won’t turn on if there isn’t any water inside, so you don’t have to worry about setting off the smoke alarm.

And speaking of smoke alarms, Nest also has one of those coming down the pipeline. They’re not on store shelves just yet, but you can make a pre-order if you’re already sold on the idea.


Bertel King, Jr.

Subscribe to our newsletter!

Our latest tutorials delivered straight to your inbox

Sign up for all newsletters.

By signing up, you agree to our Privacy Policy and European users agree to the data transfer policy. We will not share your data and you can unsubscribe at any time.

Three Ways To Secure Macs At Work: Lessons From ‘Macdefender’

For a long time, one of the strongest points for using Apple computers in your business as opposed to a Windows-based PC has been the suggestion that the Mac platform is somehow inherently more secure

But with “MacDefender” malware making the rounds, the Mac doesn’t seem quite so invincible right now. Malware on the Mac is not an entirely new phenomenon. There have been other cases, mostly proof-of-concept, in the past. And security software vendors have been sounding the alarm for some time about the potential for Mac malware. But then, that’s what security vendors do.

Is it time for Mac-running businesses to panic over security? No. But if you’ve invested in Macs for your organization, there are some common-sense steps to make sure your users are as secure as possible.

1. Educate

Because Macs have enjoyed malware-free status for so long, some of the most basic, common-sense concepts of personal computer security may be lacking among your Mac users, particularly if you’re an all-Mac shop where your users haven’t watched the security habits of PC users at work.

Be careful to inform users that there are risks out there, and of the common-sense ways to avoid getting trapped, but don’t lay it on too thick. You want to be firm enough to set up company policy, protect your users, and break through any “But Mac’s don’t get viruses” protests that may still persist. But you don’t want your users needlessly scared that everyone is out to get them when they’re online.


Yes, it’s one of the most-touted new features in recent releases of the Snow Leopard OS and is bound to be the preferred distribution point for Lion later this year, but there are signs that Apple’s sometimes-glacial pace of updating third-party software available via the Mac App Store may be putting users at risk.

But when something slips through the cracks–as a critical fault did with a recent version of Opera–users who purchased Opera via the Mac App Store are still waiting for the update to fix the security hole. Those who downloaded the browser independently of the Mac App Store have likely downloaded the update that fixes the issue. But because Apple insists that versions of software submitted to the Mac App Store remove all forms of auto-update and leave the distribution of software updates to Apple, that’s not an option.

Until Apple gets in gear and starts pushing security updates out the door of the Mac App Store more quickly, you may want to go with standalone download versions of important applications like Web browsers, even if it means you have to go the trouble of initially dragging and dropping the app to your Applications folder yourself.

3. Invest in Anti-malware Software (If You Must)

But ultimately, even when you’ve educated your users, found peer groups for support, and updated your software to the best of your ability, you may decide that to make sure your business’ Macs are really safe, you want to install and run antivirus software.

But if you do, take the time to do the research, and set a policy company-wide. You don’t want to let it vaguely be heard that Mac users should have antivirus software to protect themselves but leave the door open for users themselves to seek such protection, lest they should find themselves unwittingly undermining everything you’re trying to accomplish by selecting that “MacDefender” software..

There are plenty of anti-malware offerings for the Mac from most of the usual suspects of the PC antivirus world, including Symantec, McAfee, Kaspersky Lab, Trend Micro, Panda Security, and Sophos. If your company is a mixed Mac-and-PC environment, you can go with the same company that provides your PC antivirus software for consistency and ease of vendor relationship management.

Robert Dutt is a veteran IT journalist and blogger. He covers the Canadian IT technology solution provider scene daily at

. You can also find him on



Cancel Data Sharing Deal With Us, Eu Politicians Urge

European politicians on Tuesday demanded that a broad data-sharing agreement between the U.S. and the European Union be suspended, following allegations that the U.S. National Security Agency illegally tapped banking data.

The Terrorist Finance Tracking Program (TFTP) allows the U.S. Treasury to access some data stored in Europe by Swift, the international banking transfer company. But allegations that the NSA accessed this data without going through legal channels has led some members of the European Parliament (MEPs) to declare the agreement defunct.

None of those present at the Civil Liberties Committee’s Tuesday hearing on U.S. and E.U. countries’ surveillance plans had evidence that the NSA has actually breached Swift. The latest allegations are based on documents leaked by whistleblower Edward Snowden that indicate the NSA spied on Swift. According to the documents, Swift is included in an NSA training manual for new agents on how to target private computer networks.

Dutch MEP Sophie in’t Veld told the hearing that she considered the agreement “effectively dead.”

“We have no evidence that they have actually been doing this, but they don’t deny it either. So in a way it is irrelevant whether they have used the opportunity so far, because they will continue to reserve that right in the future,” she said, calling for the accord to be terminated.

Fellow MEPs Claude Moraes and Alexander Alvaro also called for suspension as a “minimum option.”

Broken trust

Home Affairs Commissioner Cecilia Malmström said that she had requested formal consultations with the U.S. under Article 19 of the TFTP agreement—a first step toward suspension of the deal.

She said she had written to U.S. Treasury Under-Secretary David Cohen on Sept. 12 to ask for the “how, what and when” on the spying allegations, but that she was not satisfied with the responses.

“The TFTP agreement with the U.S. was negotiated precisely to avoid that personal data of EU citizens are exposed without legal guarantees or safeguards,” Malmström pointed out. “We have made that very clear, that if those allegations are true, they constitute a breach of the agreement and the breach of the agreement can certainly lead to a suspension.”

There were however some voices of dissent. “At this point we cannot simply withdraw from the deal,” said German MEP Axel Voss.

“We have no information that would indicate that the NSA has additional direct access to the data operated by Swift,” said Rob Wainwright, director of the E.U.’s police agency, Europol. However, he added that “because of the nature of the way in which we work, it’s unlikely that Europol would have this information anyhow.”

Likewise, Swift’s general counsel Blanche Petre said there was no evidence to suggest that there has been any unauthorized access to the data, but added she would be “extremely concerned” if this proved to be the case. “Whenever we believe there is any risk to security of our services we will investigate and take whatever actions we think appropriate to mitigate the risk,” she added.

A third annual review of the TFTP program took place last month, and results have not yet been published. However the second review sparked anger among MEPs last year when it revealed that U.S. requests for European banking data were too vague to assess whether they meet E.U. data standards. But Europol still approved them.

The TFTP agreement was controversial from the start with Parliament only reluctantly agreeing to it in 2010. The European Parliament inquiry is due to present its report on surveillance by the end of this year

Squad Rules, Three With Bu Ties Reelected To Congress

Squad Rules, Three with BU Ties Reelected to Congress


Squad Rules, Three with BU Ties Reelected to Congress …while two hopefuls lost their races

US Representative Alexandria Ocasio-Cortez (CAS’11) (D-N.Y.) talking to members of the media after winning reelection November 3. AP Photo/Kathy Willens

Three Democratic women with Boston University ties won reelection to Congress on Tuesday, November 3, two of them members of the high-profile “Squad” of young progressive women who have been a frequent target of President Trump.

Squad member US Representative Alexandria Ocasio-Cortez (CAS’11) easily won a second term representing New York’s 14th District. US Representative Ayanna Pressley, who attended BU’s College of General Studies in the 1990s, won a second term representing the Massachusetts 7th District, which includes the Charles River and Medical Campuses. Ocasio-Cortez won nearly 70 percent of her district’s vote, while Pressley’s tally topped 85 percent. Their Democratic sisters on the Squad, Ilhan Omar of Minnesota and Rashida Tlaib of Michigan, also handily won reelection.

Ocasio-Cortez quickly spoke up against Trump’s false claim of a presidential-race victory in the wee hours of Wednesday and his threat to use the Supreme Court to stay in office, tweeting that it was “illegitimate, dangerous, and authoritarian.”

For her part, Pressley tweeted encouragement to fellow Democrats disheartened by Tuesday night’s results and the unresolved White House race. “Together, we have fought for our shared humanity,” she wrote. “We have organized. We have mobilized. We have legislated our values. I am so proud to be your Congresswoman & your partner in the work. I believe in the power of us. And we’re just getting started.”

One alum who is more than getting started is veteran US Representative Lois Frankel (CAS’70). The Democrat won a third term representing Florida’s 21st District, around West Palm Beach, garnering 59 percent of the vote over Republican and far-right activist Laura Loomer. Frankel had previously represented Florida’s 22nd District for two terms, before redistricting.

 Two other alums running for Congress were less fortunate.

Democrat and former Air Force intelligence officer Gina Ortiz Jones (Pardee’03, GRS’03) lost her second attempt to capture the seat in Texas’ 23rd District, losing by roughly four percentage points to Republican newcomer Tony Gonzalez. Two years ago, Ortiz Jones lost by less than a single percentage point to incumbent Will Hurd, who did not run this year. She had been considered the Democrats’ best chance to gain a seat in Texas.

“I want to thank each and every grassroots supporter, volunteer, and member of my staff who poured their heart into our campaign,” Ortiz Jones said in a statement early Wednesday. “I am so proud of the race we ran, and it is our shared commitment to fighting for working families in South and West Texas that continues to give me hope.

Outside her campaign headquarters in San Antonio, Tex., Democratic congressional candidate Gina Ortiz Jones (Pardee’03, GRS’03) speaks to the media after conceding defeat in her second bid to represent Texas’ 23rd District. AP Photo/Eric Gay

“While we came up short,” she wrote, “I will always remain dedicated to serving our country and my community in any way I can. I hope TX-23 is represented with all of her constituents in mind, and in a way in which she deserves.”

The other alumni candidate, Republican John Paul Moran (Questrom’05), fell short in his attempt to unseat Representative Seth Moulton in the Massachusetts 6th District. Moulton won a third term, with 65 percent of the vote to 35 percent for Moran.

One other alum who came up a winner Tuesday night wasn’t even in a race. NBC and MSNBC political correspondent Steve Kornacki (COM’01) made such an impression on viewers as he delved deep into the numbers on the election map that he became a Twitter hashtag. “#Kornacki is the most adorable stats nerd,” tweeted Letitia Calderon, aka @LetitiaCalder13.

Editor’s note: Race calls and vote tallies are as reported by the AP near midday Wednesday and include the vast majority of votes, although final tallies were not yet in, except for the Florida race.

Explore Related Topics:

How To Deal With Wsappx – Reason For High Disk Usage

How To Deal With Wsappx – Reason For High Disk Usage What is Wsappx?

You can see this process by following the path below –

Wsappx consists of two services –

1. AppXSVC (Appx Deployment Service)

This service is responsible for installing, updating and uninstalling Microsoft store apps. It enables Windows 10 PC to automatically update such as email apps or paint.

2. ClipSVC (Client License Service)

In plain and simple terms it is required for providing infrastructural support to the Microsoft store. If it is disabled, the apps that you have installed from the store will not function properly. This is the Windows background process that sees that the apps that you have installed or paid for are licensed.

How to Fix High Disk Usage Issue Caused By Wsappx?

Wsappx does take a considerable toll on CPU and is therefore accountable for high disk usage. Now, you might come to a conclusion that any processes that take a toll on disk usage should be removed without further ado. Wait before you disable wsappx Windows in 10. That’s because the moment you’ll try to get disable wsappx Windows 10 in the task manager, you’ll see a message warning you about the repercussions.

Your system could become unusable or shutdown abruptly. You may even lose some critical data especially if you haven’t saved it.

So, here’s you can deal with it.

Easiest and the best ways to prevent Wsappx from causing high disk usage – 1. Update Drivers On Your Windows 10 PC

High disk usage can be tackled by updating all the faulty drivers.

If you take the manual route, you would first have to identify the drivers and then exhaust a considerable amount of your precious time in searching for vendors by visiting from one website to another.

2. Stop Microsoft From Manually Updating Apps

Follow the steps and prevent Microsoft store from manually preventing apps

1. Launch Microsoft store

3. Disabling Microsoft Store Using Group Policy Editor (gpedit)

Disabling Microsoft store might sound awkward to some, but it may help prevent Wsappx from high disk usage. To disable Microsoft store, follow the steps mentioned below –

1. Open run command by pressing Win + R

2. Type chúng tôi in the search box that appears

7. You will now be required to restart your PC

4. Scan Windows PC for Viruses

One way to prevent Wsappx from causing high disk usage is by checking the Windows PC for viruses. With Windows 10 you can use the inbuilt Windows Defender security/ Windows Security to perform a full-fledged scan. Once the scan reverts with malicious programs, you can uninstall or fix them.

Or, you can choose from amongst some of the best antivirus software available.

And, if you love technology as we do, do subscribe to our Tweaklibrary Blog and visit our YouTube Channel.

Quick Reaction:

About the author

Sarang Bhargava

Update the detailed information about Three Ways Developers Can Deal With Tough Customers on the website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!