It’s like finding out on your second date that the object of your desire used to be a hooker – do you make an excuse to visit the bathroom and leave them to pay the bill, or stay to take advantage of their wide-ranging experience?
After years of direct sales, Dell wants to be a channel partner. Well, the vendor certainly knows what the customers want and has built an empire doing just that.
Can you afford to ignore their huge slice of the market?
They have so many customers that even if they’re only offering crumbs, you could quickly combine them all and build your own bakery.
And until you’ve tried the partnership you won’t know if they’ve truly given up their old street-walking ways.
Contrast this approach with a vendor which nearly always did things via the channel, but now wants to go direct with its own retail stores.
Which is worse? A partner who used to be a hooker or one who announces they’ve decided to become one, but still wants to maintain your relationship?
Too hard to figure that one. We’re just going to keep listening to the old song by the J. Geils Band recently revived by the grandfathers of head-banging, Status Quo. “My blood runs cold, my memory has just been sold, my angel is a centrefold.”
Opinion: Ding dong Dell
By
Ian Yates
on Oct 14, 2008 11:46AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Tech For Good program gives purpose and strong business outcomes

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Kaseya Dattocon APAC 2024 is Back
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report