Our Thoughts on IT Matters

Keep Posted on Industry News and Events

   

Breaking Free from Lock-In: Your Strategic Guide to Mid-Term Contract Termination

At NET(net), we’re constantly asked: “Can I terminate my agreement with XYZ Supplier mid-term?” The short answer? It’s tough—but not impossible. As you’ll see in the attached chart, termination rights for enterprise customers with technology vendors fall into one of five categories, as outlined below: Termination for convenience is rare due to vendor resistance, as it undermines revenue stability. TermScout notes 82% of customer forms seek this right, but negotiated contracts often exclude it, especially in SaaS or long-term deals. However, large enterprises with strong leverage (e.g., Fortune 100 companies) may secure this right in some ...

Read More

Top 12 Mistakes to Avoid with New IT Supplier Relationships and Agreements

Entering a new IT supplier relationship is like embarking on a promising tech venture, brimming with potential—until it derails due to avoidable missteps. A well-structured agreement should pave the way for success, but slip-ups like ambiguous contract terms, half-hearted due diligence, or assuming your supplier shares your exact vision can lead to costly delays, disputes, or unmet goals. In this article, we’ll highlight critical mistakes to steer clear of when building IT supplier agreements, offering practical tips to ensure a smoother, more reliable partnership. 1 - Lack of Clear Objectives and Requirements Mistake: Failing to define your ...

Read More

European Tech Leaders Mitigating Geopolitical Risk

European companies may face a dual challenge as the U.S. seemingly shifts its strategic focus, which may necessitate measures to assess risk and potentially reduce reliance on American based technology firms. The new US administration has signaled an increasing prioritization of its own domestic manufacturing, which has increased the specter of raising tariffs on EU goods like automobiles and machinery to shrink its $200 billion goods deficit - while simultaneously redirecting resources to counter China’s economic and political challenges across the globe. This pivot may leave EU firms exposed, as the US has signaled it can’t indefinitely ...

Read More

Cybersecurity Threats and Ransomware Attacks: A Growing Menace

Cybersecurity Threats and Ransomware Attacks: A Growing Menace Preface The days of relying on personal relationships to secure favorable deal terms are over. IT vendors are aggressively shifting their focus towards capturing a larger share of your value chain and more of your wallet share. Their maneuvers include: Subscription-based pricing models: IT vendors are locking customers into recurring fees with additional consumption costs, making it difficult to predict and control long-term technology costs. Reduced flexibility: Subscription access often comes with limited customization options, and tiered access that requires you to subscribe ...

Read More

Revolution or Obsolescence: Tech Vendors Are Redefining Industry

Revolution or Obsolescence: Tech Vendors Are Redefining Industry Preface The days of relying on personal relationships to secure favorable deal terms are over. IT vendors are aggressively shifting their focus towards capturing a larger share of your value chain and more of your wallet share. Their maneuvers include: Subscription-based pricing models: IT vendors are locking customers into recurring fees with additional consumption costs, making it difficult to predict and control long-term technology costs. Reduced flexibility: Subscription access often comes with limited customization options, and tiered access that requires you to subscribe ...

Read More

Workday Sentiment Analysis

Workday Sentiment Analysis Preface The days of relying on personal relationships to secure favorable deal terms are over. IT vendors are aggressively shifting their focus towards capturing a larger share of your value chain and more of your wallet share. Their maneuvers include: Subscription-based pricing models: IT vendors are locking customers into recurring fees with additional consumption costs, making it difficult to predict and control long-term technology costs. Reduced flexibility: Subscription access often comes with limited customization options, and tiered access that requires you to subscribe to more expensive levels that offer ...

Read More

The Insidious Mask of the Technology Channel

The Insidious Mask of the Technology Channel Preface The days of relying on personal relationships to secure favorable deal terms are over. IT vendors are aggressively shifting their focus towards capturing a larger share of your value chain and more of your wallet share. Their maneuvers include: Subscription-based pricing models: IT vendors are locking customers into recurring fees with additional consumption costs, making it difficult to predict and control long-term technology costs. Reduced flexibility: Subscription access often comes with limited customization options, and tiered access that requires you to subscribe to more expensive ...

Read More

Top 5 Ways to Expose Traps and Quash Hidden Costs

Top 5 Ways to Expose Traps and Quash Hidden Costs Executive Summary Investing in technology is crucial for business success. Whether it is to modernize, digitally transform, and/or to improve organizational performance; but hidden costs and vendor manipulations often erode expected value. This blog explores five actionable strategies—detailed spend analysis, price benchmarking, supplier audits, contract reviews, and optimization tools—that can help client organizations expose cost traps, and quash hidden costs, ensuring maximum value from their technology investments. By addressing these challenges, businesses can significantly reduce costs, ...

Read More

Teradata Surviving on Mysticism and Tyranny

Teradata Surviving on Mysticism and Tyranny Preface The days of relying on personal relationships to secure favorable deal terms are over. IT vendors are aggressively shifting their focus towards capturing a larger share of your value chain and more of your wallet share. Their maneuvers include: Subscription-based pricing models: IT vendors are locking customers into recurring fees with additional consumption costs, making it difficult to predict and control long-term technology costs. Reduced flexibility: Subscription access often comes with limited customization options, and tiered access that requires you to subscribe to more expensive ...

Read More

Surviving the Broadcom Takeover of Carbon Black

Surviving the Broadcom Takeover of Carbon Black Background Broadcom, most recently known for its extensive appetite to acquire a portfolio of semiconductor and infrastructure software solutions, recently expanded its footprint by acquiring cybersecurity firm Carbon Black. This strategic move is part of Broadcom's ongoing effort to bolster its security capabilities for enterprise customers. Carbon Black, known for its advanced endpoint security and threat detection technologies, adds to Broadcom's portfolio of robust cloud-native security solutions addressing the evolving cybersecurity landscape. Broadcom promises that the integration of ...

Read More