• Skip to main content
  • Skip to primary sidebar

This view of service management...

On the origin and the descent of managing services. We put meat on the bones.

  • Kanban Software
  • Services
    • Kanban Software Solutions
    • Consulting & Coaching
    • Training and Seminars
  • Posts
  • Events
    • Events – Agenda View
    • Events – Calendar View
  • Publications
    • Our Publications
    • Notable Publications
    • Quotes
  • About us

Suppliers and SPAM

21 June 2015 by Robert Falkowitz

I am convinced that the trend toward complex outsourcing arrangements is like the nutmeg of consolation. You’re better off sailing on the main with your own crew and not be married to a harem of third parties. While looking through some old trunks in my attic, I recently found the following hitherto unpublished manuscript that lends credence to this opinion. Please note that any resemblance between this text and the work of Mr. Theodor Geisel is purely coincidental.

Suppliers and SPAM

I am SIAM

SIAM I am

That SIAM-I-am!
That SIAM-I-am!
I do not like that SIAM-I-am!

Do you like suppliers and spam?
I do not like them, SIAM-I-am.
I do not like suppliers and spam.

Would you like them
as a prime vendor?

I would not like them
as a prime vendor.
I can tell you where to send ‘er.

I do not like suppliers and spam.
I do not like them, SIAM-I-am.

Would you like them contracted in-house?
Would you like them as a spouse?

I do not like them
contracted in-house.
I do not like them
as a spouse.
I do not like them
as a prime vendor.
And I will tell you where to send ‘er.
I do not like
suppliers and spam.
I do not like them,
SIAM-I-am.

Would you take them
with an SLA?
Would a multi-vendor contract keep them at bay?

Not with an SLA.
Not kept at bay.
Not done in-house.
Not as a spouse.
I would not use them
as prime vendor.
I would not use them, I’ll just send ‘er.
I would not use suppliers and spam.
I do not like them, SIAM-I-am.

Would you use one from Amsterdam?
Would you use one from Birmingham?

Not from Amsterdam
Not from Birmingham
Not even from a place called Greeneggham
Not as a prime vendor
Not on a bender
No SLA
Not kept at bay
Not done in house
Not as a spouse
Now I’ll be quiet as a mouse
I do not like
suppliers and spam.
I do not like them, SIAM-I-am.
I do not like YOU, S-I-AM.

Summary
Suppliers and SPAM
Article Name
Suppliers and SPAM
Description
How Theodore Geisel might have understood using third party suppliers
Author
Robert S. Falkowitz
Publisher Name
Concentric Circle Consulting
Publisher Logo
Concentric Circle Consulting

Filed Under: Service Management Tagged With: SIAM

Subscribe to our mailing list

Click here to be the first to learn of our events and publications
  • Email
  • Facebook
  • LinkedIn
  • Phone
  • Twitter
  • xing
  • YouTube

Primary Sidebar

Kanban eLearning

Kanban training online

Recent Posts

  • Verbs, nouns and kanban board structure
  • The role of the problem manager
  • The Three Indicators

Tag Cloud

service manager Cost of Delay rigidity lean value stream resource liquidity change management risk ITSM process definition tools manifesto process metrics service management tools context switching impact kanban training knowledge work ITIL lean management automation kanban flow efficiency incident flow kanban board cause histogram service request leadership agile problem knowledge management Incident Management incident management tools priority waste process bias manifesto for software development
  • Kanban Software
  • Services
  • Posts
  • Events
  • Publications
  • Subscribe
  • Rights & Duties
  • Personal Data

© 2014–2023 Concentric Circle Consulting · All Rights Reserved.
Concentric Circle Consulting Address
Log in

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}