Techprodave

Tuesday, August 24, 2004

Consulting Best Practices

I'm a computer consultant/service provider. I've been doing this since 1990. I prefer to deal with Macs, but of course, it is mostly a PC world out there, so I dabble in those too.

So, in this first blog, I'd like to talk about best practices. As a consultant/service provider you have to balance your client's needs with my own needs of not ending up with a client that yells, "FIRE", everytime there is some problem.

So, what are the client's needs?
  • Stable systems with little down time
  • The right Software
  • The right Hardware
  • The right network configuration
  • A responsive service provider and knowledgable consultant
  • All of the above at the right price.

And, what are my needs?

  • A client that pays immediately when services are rendered
  • A client that allows a level of trust to exist so I can work toward the client's needs
  • A client that doesn't go out and get other opinions without letting you know his intentions
  • A client that doesn't buy hardware or software without a reasonable amount of discussion and research
  • The ability to create a stable and secure network and computing environment

There are probably more to be added to both lists to be complete, and fair. And, I may be "out in left field" on some of this, but it is what is on my mind at this point.

Additional thoughts to consider and keep in mind from someone who manages several clients. Keep in mind the fact I have so many clients means I have a lot of information to store in my head. Or, preferably, in my Palm. Key to all of the items below is this: UNIFORMITY; UNIFORMITY; UNIFORMITY!

  • Workstation naming conventions
  • IP numbering conventions for printers, servers, workstations
  • Standardization of routers, switches, etcs. to minimize confusion
  • Minimum hardware configurations. I use 3 different standards depending on the workstation usage. Servers vary
  • Standardization of OS for workstations
  • Do everything possible to maintain password security among users and administrators
  • Maintain a list of usernames/passwords; who uses which workstation; printer IP numbers; physical address; network map; phone numbers of all critical contacts and tech support phone numbers for all important software & hardware; ISP and email provider data; and miscellaneous other configuration notes. ALL ACCESSIBLE IN MY PALM.

That's it for now. I invite comments and welcome criticism. So bring it on. If you are dealing with the same struggles I deal with, the discussions would benefit all of us.

David

0 Comments:

Post a Comment

<< Home