This post is the third post in the Consultants Typology posts. The first post is about two different Consultant types: All Around Consultants and Niche Consultants. The second post described the Consultants who knows everything.
The term Self-deprecating was used in another post: Customer Typology: The Self-deprecating Customer.
That post described a Customer who accepts any thing a Consultant recommends. This post describes an upside down state: The Consultant accepts anything the Customer would like him to recommend.
The ideology of the Self-deprecating Consultant
The Self-deprecating Consultant first priority is a satisfied customer.
In order that the customer will be satisfied, he assumes that the customer, would like confirmation of his views, therefore he supports the customers views enthusiastically.
For example, if the Customer has to select a Software product, the Consultant will praise the product, which he assumes the customer prefers. He will explain why that product fits better than other products to the customer's requirements. He will explain: why this product's future is brighter than other products' future, the advantages of the product's vendor in comparison to other vendors etc.
Sometimes, an experienced consultant, could describe the advantages better than the customer.
Who should use the Self-deprecating Consultant's services?
When the customer is a high class professional, who can make the right decision and knows how to execute the project, he actually does not need a professional consultant.
The main issue is approval by the top management. The Self-deprecating Consultant could be a valuable resource: He is an experienced Consultant who worked for many enterprises, he is not an employee, so he could be less biased by intra-organizational politics.
Why you should use another Consultant's services?
"The Failure is orphan" but not in the case of the Self-deprecating Consultant. The Self-deprecating Customer could blame his Consultant, but the Self-deprecating Consultant has no one to blame. He will be responsible for a failure.
By the way, the probability of a failure is high.
Usually a Consultant is hired because he is more experienced than the Customer and/or because he is more knowledgeable and/or because his better understanding of the subject matter.
As far as the Self-deprecating Consultant is concerned, even if he knows and understands better than the Customer, the products will not be better than products produced without any consultant's help.
What is a Consultant role?
The consultant's role is to help the customer to improve his decisions making and/or the assimilation of the decisions taken.
The bottom line is real Value for the customer.
In order to perform his role sometimes the Consultant should oppose the Customer's wrong decisions or at least the decisions the Consultant is convinced that are wrong decisions.
The Self-deprecating Consultant will not oppose any Customer's decisions, so sometimes the Customer chose an unsuitable product and/or wrong strategy and/or wrong Architecture and/or wrong Platform etc.
My Take
More than 40 organizations asked for my consultancy services. I never was a Self-deprecating Consultant. Unfortunately, I had to tell some customers that they should change their decisions. Some of them changed the Consultant instead of changing the direction or the decisions or the proposed technical process.
Usually, after two or three years they fail.
Other customers were more Flexible and Adaptive and changes their views, decisions, processes etc.
Usually, they provided Value to their organizations.
The next post will include some examples.
Blog on SOA, Cloud Computing and other IT architectural issues, technologies and trends.
Sunday, July 12, 2015
Subscribe to:
Posts (Atom)
About Me
Labels
- SOA (68)
- Vendors Survival (28)
- Cloud Computing (26)
- BPM (21)
- IBM (19)
- Microsoft (19)
- Oracle (18)
- SaaS (18)
- Google (17)
- Web 2.0 (14)
- Consultant (12)
- Apple (10)
- Mainframe (10)
- Open Source (10)
- Security (10)
- Customers Typology (9)
- Gartner (9)
- HP (9)
- Forrester Research (8)
- Sun (8)
- Customer (7)
- ERP (7)
- SAP (7)
- BEA (6)
- CRM (6)
- Case Management (6)
- Facebook (6)
- IBPMS (6)
- IaaS (6)
- Information Technology (6)
- STKI (6)
- Social networks (6)
- Wikipedia (6)
- Agility (5)
- EMC (5)
- Enterprise Architecture (5)
- IDC (5)
- Zapthink (5)
- ESB (4)
- IDS Scheer (4)
- Internet of Things (4)
- Mobile (4)
- Reuse (4)
- SalesForce.com (4)
- Search Engine (4)
- Services (4)
- Software AG (4)
- Storage (4)
- Web (4)
- Windows (4)
- ebizQ (4)
- z/os (4)
- Aberdeen Group (3)
- BPMS (3)
- Banking (3)
- Blog (3)
- Burton Group (3)
- Business Process Management (3)
- Business intelligence (3)
- Complexity (3)
- Consultants Typology (3)
- Dell (3)
- EDA (3)
- EDS (3)
- Fusion Middleware (3)
- Java (3)
- Maturity (3)
- Operating System (3)
- PC (3)
- Paas (3)
- Privacy (3)
- Public Cloud (3)
- Service (3)
- Service Oriented Architecture (3)
- Skype (3)
- Smart Phone (3)
- Software vendor (3)
- Word (3)
- YouTube (3)
- software (3)
- wearable (3)
- "SOA Filling The Gaps"" (2)
- .Net (2)
- Acquisition (2)
- Agism (2)
- Amazon (2)
- AmberPoint (2)
- Android (2)
- Anne Thomas Mannes (2)
- Apple Watch (2)
- Applications (2)
- Aris (2)
- Assembelr (2)
- BPMN (2)
- Business (2)
- Business IT gap (2)
- Business Service (2)
- CMMI (2)
- Captive (2)
- Consumer (2)
- Customer Centric (2)
- Exadata (2)
- Fujitsu (2)
- Google Glass (2)
- Hype (2)
- IBM Mainframe (2)
- Intel (2)
- Intelligent Business Operation (2)
- J2EE (2)
- Linkedin (2)
- Linux (2)
- MDM (2)
- MVS (2)
- Manager (2)
- Managers Typology (2)
- Mashups (2)
- Microsoft Azure (2)
- Mobile Banking (2)
- Mobile Computing (2)
- Multi-Channel (2)
- MySQL (2)
- OVUM (2)
- Office (2)
- Outsourcing (2)
- Pablet (2)
- PeopleSoft (2)
- Platform as a Service (2)
- Private Cloud (2)
- Process (2)
- Risk Management (2)
- Second Life (2)
- Servers (2)
- Siebel (2)
- Spam (2)
- Steve Jobs (2)
- Technology Predictions (2)
- Telco (2)
- The Good The Bad and The Ugly (2)
- Twitter (2)
- UNIX (2)
- VMware (2)
- Virtual Worlds (2)
- Virtualization (2)
- Virus (2)
- Web 3.0 (2)
- Web Services (2)
- WebMethods (2)
- Windows Phone (2)
- Wolfram Alpha (2)
- Worm (2)
- Y2K (2)
- ipad (2)
- iphone (2)
- 2011 (1)
- A (1)
- AS400 (1)
- Abstraction (1)
- Access (1)
- Accessability (1)
- Action (1)
- Adabas (1)
- Agile (1)
- Agile Methodologies (1)
- Agile manifesto (1)
- Amazon AWS (1)
- Analysis (1)
- Analyst (1)
- Ann Thomas Manes (1)
- Ann Thomas Manes Recession (1)
- Anne Thomas- Manes (1)
- Anne Thomas-Mannes Gartner (1)
- Apian (1)
- Appian (1)
- Application Delievery Controllers (1)
- Artificial cardiac pacemaker (1)
- Ascentn (1)
- Atom (1)
- Atomic bomb (1)
- Authorization (1)
- Availability (1)
- Awareness (1)
- BAM (1)
- BI (1)
- BPEL (1)
- BPEL4People (1)
- BPM Modeling (1)
- BPO (1)
- Balancing (1)
- Bank (1)
- Bankers (1)
- Bayes's theorem (1)
- Big Data (1)
- Blogger (1)
- Bug 2000 (1)
- Busines-IT Alignmnet (1)
- Business Technology (1)
- Business Transformation (1)
- Capabilities (1)
- Capital One (1)
- Captor (1)
- Case Management Framework (1)
- Cast Iron (1)
- Celent (1)
- China (1)
- Cisco (1)
- Citrix (1)
- Clients Typology (1)
- Clod Computing (1)
- Compaq (1)
- Complex Event Processing (1)
- Component Based Development (1)
- Configuration Management (1)
- Conformity Experimnets (1)
- Consumerization (1)
- Consumers Banking (1)
- Core Banking (1)
- Corporate Culture (1)
- Coud Computing (1)
- Customers Relationships Management (1)
- Custoners Typology (1)
- DCM (1)
- DDoS (1)
- DLP (1)
- DMZ (1)
- Data (1)
- Data Center in a Box (1)
- Data Warehouse (1)
- Database (1)
- Decision (1)
- Deep Knowledge (1)
- Denial of Service (1)
- Desktop Operating System (1)
- Digital (1)
- Digital Equipment Corporation (1)
- Digital Loans (1)
- Documentum (1)
- Douglas Adams (1)
- Duck and Cover (1)
- EAI (1)
- ECM (1)
- EII (1)
- Event Driven (1)
- Excel (1)
- F5 (1)
- Fintech (1)
- Firewall (1)
- Fusion Applications (1)
- Gap (1)
- Gartner Magic Quadrant (1)
- General Motors (1)
- George Orwell (1)
- Giga Information Group (1)
- Golden Gate (1)
- Google Wave (1)
- Governance (1)
- Grid (1)
- HP Alpha (1)
- HP VMS (1)
- HTC (1)
- Hardware vendor (1)
- Hilary Clinton (1)
- Human Processes (1)
- Human Processes DCM (1)
- Hybrid Cloud (1)
- Hybrid Cloud SOA filling the Gaps (1)
- IBM' Jes2 (1)
- IOS (1)
- IOT (1)
- ISPs (1)
- IT (1)
- InfoWorld (1)
- Information Architecture (1)
- Information Development Environmemt (1)
- Infrastructure as a Service (1)
- Innovation (1)
- Instant Messaging (1)
- Integration (1)
- Internet (1)
- Iphone OS (1)
- Iran (1)
- Israel (1)
- Israel Tax Authority (1)
- J D Edwards (1)
- JEE (1)
- JOE McKendrik (1)
- Jackbe (1)
- Jboss (1)
- Jobs cut (1)
- John Sculley (1)
- Laptop (1)
- Legacy Systems (1)
- Leonardo da Vinci (1)
- Let's Make a Deal (1)
- Linkrdin (1)
- Load (1)
- Loans (1)
- Lync (1)
- M3O (1)
- MRP (1)
- Magic Quadrant (1)
- Maiframe (1)
- Mainstream (1)
- Management (1)
- Mapping Application (1)
- Martin Fowler (1)
- Mashup (1)
- Mathematica (1)
- Memory (1)
- Methodoloy (1)
- Micro Services (1)
- MicroPact (1)
- Microservice (1)
- Middleware (1)
- Mobile Advertising (1)
- Mobility (1)
- Modernization (1)
- Monty Hall (1)
- Multi-Tennant (1)
- NCR (1)
- NESSI (1)
- NOSQL (1)
- NSM (1)
- Natural (1)
- Netapp (1)
- Netsuit (1)
- Netsuite (1)
- Network (1)
- Network Computer (1)
- Nokia (1)
- Not Invented Here (1)
- OLTP (1)
- Object Oriented (1)
- One Billion Chinease (1)
- Operating System (1)
- Operational Business Intelligence (1)
- Oracle Fusion (1)
- Outlook (1)
- Pareto principle (1)
- Patents war (1)
- Patty Hearst's Syndrome (1)
- Payment (1)
- Pegasystems (1)
- Penetration Test (1)
- Personal Cloud (1)
- Phil Murphy (1)
- Phishng (1)
- Pilot (1)
- Poblem Determination (1)
- Printer (1)
- Privacy Policy (1)
- Privae Cloud (1)
- Product Centric (1)
- RDBMS (1)
- RSA (1)
- RSS (1)
- Real Time (1)
- Real Time Analytics (1)
- Recession (1)
- RedHat (1)
- Registries (1)
- Registry (1)
- Request For proposals (1)
- Reuse Culture (1)
- SAP Business by Design (1)
- SOA Governance (1)
- SOA Manifesto (1)
- SOPA (1)
- SPARC (1)
- SUN Microsystems (1)
- SaaSendors Survival (1)
- Salaried Employee (1)
- SaleFoece.com HP (1)
- Samsung (1)
- Satya Nadella (1)
- Satya Nadella Cloud First (1)
- Secretary (1)
- Security Awareness (1)
- Seibel (1)
- Semantic Web (1)
- Shadow IT (1)
- Short List (1)
- Smartphone (1)
- Social (1)
- Social Applications (1)
- Social Networking Platform (1)
- Software Development (1)
- Software product (1)
- Solomon Asch (1)
- Source (1)
- Stellent (1)
- Stephen Wolfram (1)
- Steve Balmer (1)
- Strategic Consultancy (1)
- Streaming Analytics (1)
- Subscription (1)
- Successfactors (1)
- Sybase (1)
- Tablet (1)
- TechRepublic (1)
- Technology (1)
- Telephone (1)
- Teradata (1)
- The Peter Principle (1)
- The Stealth (1)
- Theory Z (1)
- Thought Leaders (1)
- Tibco (1)
- Trend Micro "SOA Filling The Gaps"" (1)
- UDDI (1)
- USA (1)
- Unica (1)
- Utilizar (1)
- VM (1)
- VSE (1)
- Value (1)
- Vendors Survivval (1)
- Verizon (1)
- Verizon Wireless (1)
- Viacom (1)
- Virtual Machine (1)
- Vitria (1)
- WS-BPEL (1)
- WS-Coordination (1)
- WS-HT (1)
- WaterFall (1)
- Waze (1)
- Wearable Computing (1)
- Web Security (1)
- WebSphere (1)
- Whinchester Mystery House (1)
- Wide Knowledge (1)
- Wiki (1)
- Wikimania 2011 (1)
- Wisdom of the Crowd (1)
- Xbox Live (1)
- Yahoo Finance (1)
- Yahoo! (1)
- Zen (1)
- anti-virus (1)
- buzzword (1)
- cellular (1)
- e-mail (1)
- e-mail Security (1)
- failure (1)
- health (1)
- mac (1)
- mail (1)
- patents (1)
- performance (1)
- repository (1)
- success (1)
- threat (1)
- unemployment (1)
- work (1)
- z-Enterprise (1)
- z10 (1)
