<s>
At	O
present	O
,	O
most	O
large	O
and	O
mid-size	O
companies	O
have	O
outsourced	B-Architecture
their	O
tech	O
support	O
operations	O
.	O
</s>
<s>
Many	O
companies	O
provide	O
discussion	B-Application
boards	I-Application
for	O
users	O
of	O
their	O
products	O
to	O
interact	O
;	O
such	O
forums	O
allow	O
companies	O
to	O
reduce	O
their	O
support	O
costs	O
without	O
losing	O
the	O
benefit	O
of	O
customer	O
feedback	O
.	O
</s>
<s>
Dell	O
was	O
amongst	O
the	O
first	O
companies	O
to	O
outsource	B-Architecture
their	O
technical	O
support	O
and	O
customer	O
service	O
departments	O
to	O
India	O
in	O
2001	O
.	O
</s>
<s>
For	O
businesses	O
needing	O
to	O
provide	O
technical	O
support	O
,	O
outsourcing	B-Architecture
allows	O
them	O
to	O
maintain	O
high	O
availability	O
of	O
service	O
.	O
</s>
<s>
For	O
businesses	O
needing	O
technical	O
support	O
assets	O
,	O
outsourcing	B-Architecture
enables	O
their	O
core	O
employees	O
to	O
focus	O
more	O
on	O
their	O
work	O
in	O
order	O
to	O
maintain	O
productivity	O
.	O
</s>
<s>
Remote	O
computer	O
repair	O
is	O
a	O
method	O
for	O
troubleshooting	O
software	O
related	O
problems	O
via	O
remote	B-Protocol
desktop	I-Protocol
connections	O
.	O
</s>
<s>
This	O
includes	O
troubleshooting	O
methods	O
such	O
as	O
verifying	O
physical	B-Application
layer	I-Application
issues	O
,	O
resolving	O
username	O
and	O
password	O
problems	O
,	O
uninstalling/reinstalling	O
basic	O
software	B-Application
applications	I-Application
,	O
verification	O
of	O
proper	O
hardware	O
and	O
software	O
set	O
up	O
,	O
and	O
assistance	O
with	O
navigating	O
around	O
application	O
menus	O
.	O
</s>
<s>
A	O
common	O
scam	O
typically	O
involves	O
a	O
cold	B-Protocol
caller	I-Protocol
claiming	O
to	O
be	O
from	O
a	O
technical	O
support	O
department	O
of	O
a	O
company	O
like	O
Microsoft	O
.	O
</s>
<s>
The	O
scammer	O
will	O
instruct	O
the	O
user	O
to	O
download	O
a	O
remote	B-Protocol
desktop	I-Protocol
program	O
and	O
once	O
connected	O
,	O
use	O
social	O
engineering	O
techniques	O
that	O
typically	O
involve	O
Windows	B-Application
components	O
to	O
persuade	O
the	O
victim	O
that	O
they	O
need	O
to	O
pay	O
in	O
order	O
for	O
the	O
computer	O
to	O
be	O
fixed	O
and	O
then	O
proceeds	O
to	O
steal	O
money	O
from	O
the	O
victim	O
's	O
credit	O
card	O
.	O
</s>
