{"id":505,"date":"2012-12-14T11:33:34","date_gmt":"2012-12-14T16:33:34","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/2012\/12\/times-have-changed\/"},"modified":"2012-12-14T11:33:34","modified_gmt":"2012-12-14T16:33:34","slug":"times-have-changed","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2012\/12\/times-have-changed\/","title":{"rendered":"Times Have Changed&hellip;"},"content":{"rendered":"<p>The I.T. field has changed. I wish I could say that it has been to your benefit, the partner; but I can\u2019t. The recession of 2007 hurt many many businesses. Some of you felt the effect immediately, while others felt it 18 months later. Unfortunately, some of you are still experiencing it. But is that what is really hurting your I.T. business? In my opinion the answer is \u201cNo\u201d!  <\/p>\n<p>I think this is because the I.T. business is evolving into \u201cmonkey proof\u201d solutions. What I mean by that is larger companies such as Microsoft, Google, Dell, etc. are making it easier for your clients to run their technology. They no longer need to purchase I.T. solutions from you. Even security companies are making software and hardware based solutions easier to implement, maintain, and protect their resources.  <\/p>\n<blockquote>\n<p>\u201cOh, but &#8220;I offer monitoring?\u201d So does X Company.  <\/p>\n<p>\u201cI have backup solutions?\u201d Yep, X Company does that too: Onsite and offsite.  <\/p>\n<p>\u201cMy clients are special\u2026 They need blah, blah, blah that only I offer!\u201d Whatever. <\/p>\n<\/blockquote>\n<p>So where does this leave you and your humble I.T. business: Unemployed and out of business\u2014respectfully speaking. Am I saying you need to close up shop and find another trade offered at your local community college? Not at all\u2026 What I am saying is that you need to make implementing, maintaining, and repairing technology a secondary offering. The majority of your time needs to be dedicated in showing your clients HOW to use technology to make their work easier and their business run more smoothly. This process requires you to start asking more business questions and less technology questions.  <\/p>\n<p>Ask yourself: \u201cDoes this company have a proper business workflow process that is efficient and effective?\u201d\u2014and yes, there is a difference between the two. They are not synonyms.  <\/p>\n<p><a href=\"http:\/\/www.exchangedefender.com\/blog\/media\/c4c2aef9a830_6FFC\/sm3-whitebackground.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; margin: 0px 0px 0px 16px; padding-left: 0px; padding-right: 0px; display: inline; float: right; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"sm3-whitebackground\" border=\"0\" alt=\"sm3-whitebackground\" align=\"right\" src=\"http:\/\/www.exchangedefender.com\/blog\/media\/c4c2aef9a830_6FFC\/sm3-whitebackground_thumb.png\" width=\"167\" height=\"158\"><\/a>Now comes the commercial portion of this post. I would be remiss in my training from Vlad Mazek if you expected anything less. We spent a lot of time, a lot of energy, and a lot of money redesigning Shockey Monkey v.3 to greatly assist you in creating and working in a solid business workflow process. We have added modules that address Human Resource needs, Marketing needs, and Sales needs. And this is just the beginning. As we wrap up development for Shockey Monkey v.3, we are already looking into the future to make future updates and releases even more robust but without all the clutter that tends to be associated with growing a business platform. If you haven\u2019t done so already, visit us at <a href=\"http:\/\/www.shockeymonkey.com\">Shockey Monkey<\/a> and see what you are missing. Try it out today, it\u2019s FREE!  <\/p>\n<p>Michael D. Alligood<br \/>Partner Sales &amp; Support, ExchangeDefender &amp; Shockey Monkey<br \/><a href=\"mailto:michael@ownwebnow.com\">michael@ownwebnow.com<\/a><br \/>(877) 546-0316 x707  <\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-505","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=505"}],"version-history":[{"count":0,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/505\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}