Feeds

Alarm bells ring at Big Blue brekker

It's a direct betrayal of the channel

  • alert
  • submit to reddit

Seven Steps to Software Security

Just before Doug LeGrande, general manager of IBM's PSG Emea was about to stab his business partners in the front, the fire alarm went off at the Sherlock Holmes Hotel, Baker Street. Two fire engines duly turned up to put out the non-existent fire and we returned to the basement to watch LeGrande perform his act of virtual arson, with us to fan the flames. We already knew about the meeting in Monaco six weeks ago, when LeGrande told his BPs about Big Blue's plans. (Story: Big Blue makes European channel u-turn look like a fast oil tanker -- and many another story much earlier this year). But the McCoy is this: "We're introducing new Ts&Cs, reducing price protection effective March next year. "The major focus for us is end customers, not channel loading. We've adapted our Ts&Cs to stimulate end user sales. We will not repeat the problems of the past which end up with problems for all concerned. "We've a new term called fat free fulfilment aimed at squeezing out any element of cost through the channel to the end user. Excess fat comes out. "We told our BPs in Monaco that we'll no longer say no to customers who say will you sell direct. Our BPs appreciated the fact we told them what we were going to do." So they didn't stab the channel in the back. It was in the front. And IBM has once more repeated the mistakes of the past. If Mike Lunch, former GM of the IBM PC Co in the UK, was dead, he'd be spinning in his grave. ®

Boost IT visibility and business value

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.