This article comes from Solitaire Consulting Associate, Tim Rogers MBA There are lots of models for change management that have developed over many years. Not all will work in all situations so it is essential to have several tools in your toolbox and select the right one for the right situation. The House of Change […]
Change
Top 5 buying factors for Enterprise Software
Whatever size business you are, selecting the right enterprise software is a big decision that you want to get right. Your choice of core system is one that will impact your business for many years to come.
5 Fundamentals for a successful project
I am often asked about what makes a successful project, so I have put together these 5 fundamentals, which are, in my opinion, the most important aspects to managing business projects. I can’t guarantee your project will be a success, but I can definitely guarantee it won;t be if you don’t have these basics in […]
What is your greatest business asset? Hint: it is not your people!
You’ve probably heard the phrase, “Our people are our greatest asset”. You may have even used it, or other variations of the same phrase. But is it true? I don’t believe it is and in this post I am going to describe what I think the greatest asset of your business is. The people that […]
NEWS: new associates and new office
New Associates We now have access to a number of associate consultants who bring a wealth of experience from their different backgrounds. This provides Solitaire Consulting with the opportunity to take on much larger projects or to be more flexible with the work we undertake for our clients. Specific experience that is now available includes: […]
How safe is your data?
With cyber security hitting the headlines almost daily, many organisations are rightly concerned about the vulnerability of their data and are devoting serious time and resources to protecting this vital business asset. Traditional security methods have focused on improving the boundary defences of the organisation; aiming to prevent undesirable penetration of the network and to […]