Topics
Content Types
About 28 results
-
Check out two Microsoft Project alternatives: Basecamp and QuickBase
When managing an IT initiative, most technology professionals automatically turn to Microsoft Project. Erik Eckel describes two highly-capable alternatives to Microsoft Project: 37...
-
How to improve borderline client relationships
Here are four methods for reinvigorating a client relationship that has become strained. If these tactics don't work, it may be time to cut the client loose.
-
Adopt these practices to ensure professional bid submissions
Bid and RFP events are opportunities to form strong, long-term relationships with new clients. Follow these guidelines when responding to a bid, estimate, or RFP request.
-
Adopt this simple checklist for a smooth client service migration
IT consultant Erik Eckel explores the most critical documentation and credentials you must receive when onboarding a new client.
-
A recommended reading list for IT consultants
Here is Erik Eckel's short list of books that he believes best serve technology consultants.
-
Build a better test bench for your IT consultancy
The design of your test bench can have a big impact on productivity and profitability. Based on real-world experience, IT consultant Erik Eckel offers five proven tenets of efficie...
-
Data center build-out considerations for small IT consultancies
Your IT consulting firm can gain a competitive edge in its region by building its cloud network. Here are three factors to consider before making this investment.
-
Deliver maximum client value and profitability via PSA
A professional services automation application can help your IT consulting firm with sales, CRM, invoicing, and other tasks, which will improve operations and lower costs.
-
Three ways to assist clients with BYOD management
Clients will need your help in managing the Bring Your Own Device (BYOD) trend. Here are three steps you should take.
-
Three security services consultants should deploy for clients
An FBI 2013 Cyber Trends seminar provides compelling evidence as to why your clients must adopt email filtering, email encryption, and intrusion detection services.