tag:blogger.com,1999:blog-22311364.post1888783314189212522..comments2024-03-29T02:13:29.411-07:00Comments on Small Biz Thoughts by Karl W. Palachuk: Quick Technology Inventory from ProspectsKarl W. Palachukhttp://www.blogger.com/profile/10854725002875547297noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-22311364.post-45212050696805113812016-05-17T08:34:53.197-07:002016-05-17T08:34:53.197-07:00Thanks Josh. I do think there's value is start...Thanks Josh. I do think there's value is starting a conversation with "forms" because it shows the client that you have a system and a way of doing things. As simple as it is, it makes you stand out from the crowd.<br /><br />Hey. Aren't you in Belize? Isn't there a beach you should be at?<br />Karl W. Palachukhttps://www.blogger.com/profile/10854725002875547297noreply@blogger.comtag:blogger.com,1999:blog-22311364.post-7801994714907677262016-05-17T07:51:22.548-07:002016-05-17T07:51:22.548-07:00This almost perfectly mirrors our "brief site...This almost perfectly mirrors our "brief site survey form" that we use. The biggest exception is that we make a point of having them demonstrate that they can login to their firewall (one in three have one at all and less than half of those have credentials). And finally, we ask them to work with us to locate their backup data (on-site an off-site) and restore one file. Less than one in three can do that either.<br /><br />These wedge techniques have brought us a lot of interested, if not interesting clients. Joshua Libermanhttps://www.blogger.com/profile/08070694607743004462noreply@blogger.comtag:blogger.com,1999:blog-22311364.post-74327990093298603682016-05-16T19:44:03.529-07:002016-05-16T19:44:03.529-07:00Again, this is just the super basics. Search this ...Again, this is just the super basics. Search this blog (upper left hand corner) for "roadmap" or 68 point checklist and you'll get a richer sense of what we do to go in depth with prospect and client networks.<br /><br />Thanks for the note.Karl W. Palachukhttps://www.blogger.com/profile/10854725002875547297noreply@blogger.comtag:blogger.com,1999:blog-22311364.post-20636518286972775782016-05-16T18:49:27.592-07:002016-05-16T18:49:27.592-07:00Perhaps, though your approach to supporting the ne...Perhaps, though your approach to supporting the network will vary wildly based on the information gleaned from this question - indeed every one of the inventory questions you mention. I would also make an effort to understand the prospect's approach and attitude towards technology. The inventory is, of course not going to give me that, but perhaps some well-placed open-ended questions might get you a little closer (depending on the prospect).Kevinhttps://www.blogger.com/profile/00588070439046598831noreply@blogger.comtag:blogger.com,1999:blog-22311364.post-30423995143781431152016-05-15T15:58:00.871-07:002016-05-15T15:58:00.871-07:00Good point. Although it might say more about the p...Good point. Although it might say more about the previous IT consultant than the prospect.Karl W. Palachukhttps://www.blogger.com/profile/10854725002875547297noreply@blogger.comtag:blogger.com,1999:blog-22311364.post-18577219191478718572016-05-15T07:18:57.636-07:002016-05-15T07:18:57.636-07:00I might also want to know what their primary means...I might also want to know what their primary means of authentication (resource control) is: (Peer to Peer, AD, Other). Knowing that one thing say a lot about a potential client.Kevinhttps://www.blogger.com/profile/00588070439046598831noreply@blogger.comtag:blogger.com,1999:blog-22311364.post-53845691457604212522016-05-12T20:44:32.812-07:002016-05-12T20:44:32.812-07:00Right you are!Right you are!Karl W. Palachukhttps://www.blogger.com/profile/10854725002875547297noreply@blogger.comtag:blogger.com,1999:blog-22311364.post-26951535752995546212016-05-12T20:30:40.002-07:002016-05-12T20:30:40.002-07:00I think you meant to say "People who DON'...I think you meant to say "People who DON'T know this stuff are not my clients!" :-)Anonymousnoreply@blogger.com